Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Vulnerability Testing
YouTube
education
Showing:
32
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Bug Bounty Methodology
0
rewiews
Learn comprehensive bug bounty techniques, from reconnaissance to vulnerability discovery, with practical tips for successful ethical hacking and reporting security flaws in web applications.
Add to list
28
Lesons
6 hours
On-Demand
Free-Video
Bugcrowd
Back to Basics - Application Security Practices in Smart Contract Auditing
0
rewiews
Explore application security practices in smart contract auditing, focusing on Solidity, common vulnerabilities, security tools, and the growing market for blockchain security engineers.
Add to list
16
Lesons
48 minutes
On-Demand
Free-Video
Bugcrowd
Critical Security Issues and Trends for 2017
0
rewiews
Explore critical security trends with industry experts, covering IoT vulnerabilities, crowdsourced testing, AI impacts, and evolving threats to prepare for the cybersecurity landscape of 2017.
Add to list
8
Lesons
1 hour 4 minutes
On-Demand
Free-Video
OWASP Foundation
Purple Team Strategies for Application Security
0
rewiews
Explore purple team strategies for application security, blending red and blue team approaches to enhance vulnerability testing, automation, and security infrastructure integration.
Add to list
30
Lesons
34 minutes
On-Demand
Free-Video
Linux Foundation
How to Effectively Test Transient Execution Mitigations
0
rewiews
Explore transient execution vulnerability testing methods, challenges, and future improvements for effective mitigation in software and hardware systems.
Add to list
14
Lesons
30 minutes
On-Demand
Free-Video
OWASP Foundation
Hackazon: Stop Hacking Like It's 1999
0
rewiews
Explore Hackazon, a modern vulnerable web app for testing security skills. Learn about its AJAX interface, RESTful APIs, and configurable vulnerabilities that challenge both automated scanners and manual pentesters.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Broken Web Applications - Future Developments Beyond Version 1.0
0
rewiews
Explore OWASP's virtual machine with 25+ vulnerable web applications for security training and testing. Learn about project features and future developments in web application security.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Security Does Not Need to Be Fun - Ignoring OWASP to Have a Terrible Time
0
rewiews
Explore OWASP's free tools and resources for designing and implementing secure web applications, addressing common security challenges in the software development lifecycle.
Add to list
17
Lesons
28 minutes
On-Demand
Free-Video
OWASP Foundation
Azure Vulnerability Testbed (AzGOAT) - Understanding and Hardening Azure Security
0
rewiews
Explore Azure security vulnerabilities and defenses with AzGOAT, a lab environment for understanding attack surfaces, designing secure solutions, and minimizing threats in Azure environments.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Hunting for Amazon Cognito Security Misconfigurations
0
rewiews
Explore Amazon Cognito security misconfigurations, learn testing techniques for audits and bug bounty hunting, and discover mitigation strategies through a real-world account takeover case study.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
WEareTROOPERS
Vulnerability Testing, a Case Study
0
rewiews
Explore vulnerability testing through a real-world case study, gaining insights into effective security assessment techniques and practical application of testing methodologies.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
OWASP Foundation
Compression Bombs Strike Back
0
rewiews
Explore data compression risks, HTTP vulnerabilities, and server attack techniques in this comprehensive security analysis of compression-related threats.
Add to list
20
Lesons
39 minutes
On-Demand
Free-Video
WEareTROOPERS
Implementing an USB Host Driver Fuzzer
0
rewiews
Explore USB host driver fuzzing techniques, covering USB basics, security implications, and practical implementation steps for effective vulnerability discovery.
Add to list
20
Lesons
44 minutes
On-Demand
Free-Video
Hack in Paris
Beyond OWASP Top 10 by Aaron Hnatiw - Hack in Paris - 2017
0
rewiews
Explore 5 dangerous web vulnerabilities beyond OWASP Top 10, covering exploits and mitigations for both developers and pentesters to enhance application security.
Add to list
14
Lesons
45 minutes
On-Demand
Free-Video
OWASP Foundation
FIESTA - An HTTPS Side-Channel Party
0
rewiews
Explore HTTPS side-channel vulnerabilities and a new tool, FIESTA, for testing and exploiting these issues. Learn about a novel side-channel affecting major tech companies and its implications for online security.
Add to list
22
Lesons
42 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP IoTGoat Project Overview and Roadmap
0
rewiews
Explore IoTGoat, an OWASP project for IoT security testing. Learn about hardware compatibility, vulnerabilities, and hands-on techniques like firmware extraction and password cracking.
Add to list
14
Lesons
36 minutes
On-Demand
Free-Video
USENIX
SweynTooth - Unleashing Mayhem over Bluetooth Low Energy
0
rewiews
Explores vulnerabilities in Bluetooth Low Energy protocol implementations, presenting a systematic fuzzing framework that discovered 11 new vulnerabilities across various devices and IoT products.
Add to list
16
Lesons
25 minutes
On-Demand
Free-Video
0xdade
IOT RCE - A Study With Disney
0
rewiews
Explore IoT device vulnerabilities using Disney's Circle and Foscam as case studies. Learn novel attack techniques, including SSL bypasses, SSID injection, and cloud routing abuse. Discuss IoT devices' use of offensive tools.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
Auditing the Compression Algorithm Weapon Cache
0
rewiews
Explore decompression bomb attacks, their impact on applications, and strategies for prevention. Learn about various compression algorithms and their vulnerabilities in this security-focused presentation.
Add to list
32
Lesons
28 minutes
On-Demand
Free-Video
BSidesLV
Defeating Machine Learning - Systemic Deficiencies for Detecting Malware
0
rewiews
Explore systemic vulnerabilities in machine learning for malware detection, covering sandbox evasion, model problems, and potential solutions for improved cybersecurity.
Add to list
21
Lesons
45 minutes
On-Demand
Free-Video
USENIX
Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation
0
rewiews
Innovative USB testing framework enabling cost-effective, flexible analysis and modification of USB communication. Introduces two-way emulation for enhanced fuzzing and vulnerability detection.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
Black Hat
The Defense Rests - Automation and APIs for Improving Security
0
rewiews
Explore automation and APIs for enhancing security through centralized management, testing, and evidence-driven approaches. Learn to leverage open-source tools and protocols for efficient vulnerability detection and faster recovery.
Add to list
13
Lesons
27 minutes
On-Demand
Free-Video
Recon Conference
How to Hack Shannon Baseband
0
rewiews
Explore remote baseband vulnerabilities in Samsung modems, including attack surface analysis, bug discovery, testing methods, and potential exploitation techniques for mobile network security.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
Intro to Fuzzing for Fun and Profit
0
rewiews
Explore fuzzing techniques for software security, covering tools like AFL and Python fuzzers, memory error detection, debugging strategies, and advanced fuzzing methods.
Add to list
31
Lesons
45 minutes
On-Demand
Free-Video
EuroPython Conference
Ethical Hacking with Python Tools
0
rewiews
Explore ethical hacking using Python tools for security testing, vulnerability analysis, and pentesting. Learn to develop custom security tools and conduct demonstrations on target domains.
Add to list
28
Lesons
40 minutes
On-Demand
Free-Video
NDC Conferences
How to Hack Your Own Mobile App
0
rewiews
Learn techniques to identify and mitigate security vulnerabilities in Xamarin-based mobile apps, focusing on OWASP Mobile Top 10 threats and practical defense strategies.
Add to list
10
Lesons
49 minutes
On-Demand
Free-Video
Black Hat
Fuzzing and Breaking Security Functions of SIMATIC PLCs
0
rewiews
Explore techniques for cracking TLS protocols, conducting security protocol fuzzing, and analyzing vulnerabilities in Siemens S7-1500/S7-1200 PLCs, with practical demonstrations of exploiting and controlling these industrial devices.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Bugcrowd
Web API Testing: Fundamentals and Best Practices
0
rewiews
Learn to test for API vulnerabilities and explore OWASP guidelines in this practical tutorial on identifying and addressing web API security issues.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
DEFCONConference
Automotive USB Fuzzing: Efficient Methods and Real-World Vulnerabilities
0
rewiews
Dive into automotive USB fuzzing techniques and discover efficient methods for testing vehicle vulnerabilities through direct USB connections, featuring real-world case studies and practical demonstrations.
Add to list
17
Lesons
38 minutes
On-Demand
Free-Video
Fuzzing_in - Hardik Shah
Snapshot Fuzzing with WTF Fuzzer - Techniques and Implementation
0
rewiews
Master snapshot fuzzing with WTF Fuzzer. Configure Hyper-V, use Windbg and Bdump.js for snapshotting, develop harnesses, and fuzz C programs. Enhance your software security skills through hands-on practice.
Add to list
9
Lesons
39 minutes
On-Demand
Free-Video
USENIX
Towards Generic Database Management System Fuzzing
0
rewiews
Discover how BUZZBEE framework revolutionizes database security testing by effectively fuzzing both SQL and NoSQL systems, revealing vulnerabilities and achieving superior code coverage compared to existing solutions.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
USENIX
Vulnerability-oriented Testing for RESTful APIs
0
rewiews
Discover a novel framework for detecting security vulnerabilities in RESTful APIs through functionality-based testing, featuring practical demonstrations and real-world applications in API security testing.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
load more...