Главная
Study mode:
on
1
Intro
2
Tony DeLaGrange
3
Jason Wood
4
Why Attack the Client?
5
HTML 5 Support in Browsers
6
Attacks with HTML5
7
Most Supported Features
8
HTML 5 "Cool" Features
9
Baaa-Dump... Baaaaa Dump...
10
SHARK Repository
11
SHFARK Environment Setup
12
Test Drive HTML 5 Features
13
Some "Cool" Features
14
But Wait, There's More!
15
DDOS Attack
16
Browser History Tampering
17
Mod_Security Filtering Rules
18
Testing SHARK Rules
Description:
Explore HTML5 security vulnerabilities and attack vectors in this 50-minute conference talk from Derbycon 2012. Dive into client-side attacks, browser support for HTML5, and the most exploitable features. Learn about the SHARK repository, environment setup, and testing HTML5 capabilities. Discover advanced techniques like DDOS attacks and browser history tampering. Gain insights on mod_Security filtering rules and testing SHARK rules to enhance web application security.

HTML5 Security Vulnerabilities and Attacks - Taking a Byte Out of HTML5

Add to list
0:00 / 0:00