Главная
Study mode:
on
1
Intro
2
Security Vulnerability == Sexy Bug
3
Security Winerability -- Sexy Bug
4
Design Flaws
5
JavaScript Can Application Content
6
Hijacking Applications
7
Emulating Namespaces
8
Shimming Ajax.Request
9
Shimmed Version of Ajax.Request
10
Dumping Client-side Databases List Mania!
11
Detecting Remote Application State
12
OMG! Timing Attacks. 3
13
In The Beginning...
14
Blast From The Past
15
Steal Browser History
16
Expanding History Theft
17
Word Case & Order Affect URL
18
How Many Combos?
19
Totally Doable
20
De-anonymization
21
Attacking The Enterprise With JavaScript
22
Attackers Want Internal Systems
23
Browsers Provide a Foothold
24
Everything has a Web Interface
25
Obfuscated JavaScript
26
Hydrate Function
27
Invisible Malicious Code!
28
Take Away
Description:
Explore the darker side of JavaScript in this provocative JSConf talk. Delve into security vulnerabilities, design flaws, and potential exploits within the language. Learn about application content hijacking, namespace emulation, and client-side database manipulation. Discover timing attacks, browser history theft techniques, and de-anonymization methods. Examine how attackers can leverage JavaScript to target internal systems and enterprise networks. Gain insights into obfuscated JavaScript and invisible malicious code. Walk away with a deeper understanding of JavaScript's potential security risks and how to mitigate them in your own applications.

JavaScript - The Evil Parts

JSConf
Add to list
0:00 / 0:00