Max Level Web App Security - Attacks, Exploits, and Response Strategies

Max Level Web App Security - Attacks, Exploits, and Response Strategies

via YouTube Direct link

Attack sources

11 of 30

11 of 30

Attack sources

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Max Level Web App Security - Attacks, Exploits, and Response Strategies

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Break Down
  3. 3 Collecting data
  4. 4 Trend data sets
  5. 5 Attacks!
  6. 6 Specific attacks against software
  7. 7 Life-cycle of an exploit
  8. 8 Theory about this trend...
  9. 9 PHP-CGI remote code execution
  10. 10 Attack Response
  11. 11 Attack sources
  12. 12 A little about incident response
  13. 13 Response breakdown
  14. 14 Standard approach
  15. 15 Auditing nitty gritty
  16. 16 File System Monitoring
  17. 17 Using find to cleanup
  18. 18 Attacker Motivation
  19. 19 Example.htaccess infection
  20. 20 Registrars
  21. 21 IP address
  22. 22 Backdoor evolution
  23. 23 Collection
  24. 24 Getting backdoors from attack logs
  25. 25 Dead Simple
  26. 26 Base64 decode
  27. 27 Regex revenge
  28. 28 Variables as functions
  29. 29 Backdoor Conclusions
  30. 30 Further Reading

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.