Главная
Study mode:
on
1
Felix Leder
2
Conclusion
3
Examples
4
Comparisons
5
Rent
6
Stuxnet
7
The problem
8
Examples to get started
9
What is problem
10
Helios
11
Energy Sector
12
Symmetric Cryptography
13
Storm Botnet
14
Sickpot
15
Ransomware
16
AES symmetric encryption
17
Zeus
18
PHP MyAdmin
19
CP Users
20
Loodle
21
DanDroid
22
Sequel Injection
23
Prepared Statements
24
Secure Methods
25
Botnets
26
Relay Node
27
XML
28
XML parser
29
AES encryption
30
Download command
31
Naked truth
32
IP random number generation
33
MaxMind GUIP database
34
Summary
35
OS Top 10
36
Buffer Overflows
Description:
Explore bug hunting techniques in malware and cybercrime during this conference talk from AppSecEU 2016 in Rome. Delve into various examples and comparisons, including Stuxnet, Helios, and the Storm Botnet. Learn about symmetric cryptography, AES encryption, and ransomware. Examine security vulnerabilities in PHP MyAdmin, SQL injection, and XML parsing. Discover insights on botnets, IP random number generation, and the OWASP Top 10. Gain valuable knowledge on identifying and understanding malicious software, enhancing your cybersecurity skills in the process.

Bug Hunting on the Dark Side

OWASP Foundation
Add to list