Node.js Application Insecurity - OWASP AppSec California 2015

Node.js Application Insecurity - OWASP AppSec California 2015

OWASP Foundation via YouTube Direct link

Tips

23 of 42

23 of 42

Tips

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Node.js Application Insecurity - OWASP AppSec California 2015

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda
  3. 3 Not chance
  4. 4 Target audience
  5. 5 What is NoDot
  6. 6 Why NoDot
  7. 7 Frameworks
  8. 8 Categories
  9. 9 Crosssite scripting
  10. 10 escaping code
  11. 11 escape modules
  12. 12 secret section
  13. 13 user input
  14. 14 query language
  15. 15 use prepared statements
  16. 16 portrait protection
  17. 17 false opening
  18. 18 headers
  19. 19 classic
  20. 20 eval
  21. 21 exit method
  22. 22 GitHub example
  23. 23 Tips
  24. 24 Record diversity
  25. 25 Not my test
  26. 26 Random numbers
  27. 27 Random bytes
  28. 28 Pseudorandom
  29. 29 Rocket
  30. 30 Stupid Dancer
  31. 31 Im tutoring area
  32. 32 Openness
  33. 33 Documentation
  34. 34 The problem
  35. 35 Honey success
  36. 36 Buffer class
  37. 37 Buffer
  38. 38 ReadWrite
  39. 39 Buffer Overflow
  40. 40 Watch out allocations
  41. 41 Summary
  42. 42 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.