Finding vulnerabilities with automation (the SAST way)
SAST - static application security testing is a great addition to every security team's SSDL (secure software development lifecycle). See how you can build on automation to find vulnerabilities before they are reaching production code.
##############################
Want free coffee? Enter ShiftLeft's raffle for a free year of coffee! Here's how:
1. Sign up for a ShiftLeft account (using this link: https://bit.ly/2PMVqZW)
2. Scan an application
3. Start a free 15-day Premium ShiftLeft account
Once you've done this, let them know (https://bit.ly/2PMVqZW). Want additional entries into the raffle? Invite your AppSec teammates to give ShiftLeft a try, and they will give you up to three additional entries.
Three people from all entries will be selected. Good luck!
##############################
💡 If you have any questions or want to request a new video about a special topic, feel free to leave me a comment. You can also contact me on all of my social medias below.
💖 I need your help. Subscribe to this channel, link and retweet my videos and share them with your friends. This going to help make this project more sustainable in the long-run.
👕 If you fancy some swag, make sure to check out https://teespring.com/stores/hacksplained-hacking-store
💙 Last but not least: Subscribe to my Twitter channels https://twitter.com/hacksplained & https://twitter.com/PascalSec, and support me on Patreon https://www.patreon.com/hacksplained or https://www.buymeacoffee.com/hacksplained
Видео Finding vulnerabilities with automation (the SAST way) канала Hacksplained
##############################
Want free coffee? Enter ShiftLeft's raffle for a free year of coffee! Here's how:
1. Sign up for a ShiftLeft account (using this link: https://bit.ly/2PMVqZW)
2. Scan an application
3. Start a free 15-day Premium ShiftLeft account
Once you've done this, let them know (https://bit.ly/2PMVqZW). Want additional entries into the raffle? Invite your AppSec teammates to give ShiftLeft a try, and they will give you up to three additional entries.
Three people from all entries will be selected. Good luck!
##############################
💡 If you have any questions or want to request a new video about a special topic, feel free to leave me a comment. You can also contact me on all of my social medias below.
💖 I need your help. Subscribe to this channel, link and retweet my videos and share them with your friends. This going to help make this project more sustainable in the long-run.
👕 If you fancy some swag, make sure to check out https://teespring.com/stores/hacksplained-hacking-store
💙 Last but not least: Subscribe to my Twitter channels https://twitter.com/hacksplained & https://twitter.com/PascalSec, and support me on Patreon https://www.patreon.com/hacksplained or https://www.buymeacoffee.com/hacksplained
Видео Finding vulnerabilities with automation (the SAST way) канала Hacksplained
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
What is SAST?Black Duck SCA & Coverity Static Analysis (SAST) Integrations with Amazon AWS CI Tools | SynopsysHow to conduct a basic security code review | Security SimplifiedSSH Jump Server Access and How To Pivot Using OpenVPN & ProxychainsDynamic Application Security Testing (DAST) applied to WebGoatHow to Analyze Code for Vulnerabilities using JoernSAST vs DAST | Static Application Security Testing | Dynamic Application Security Testing | VAPTEp19: How to run SAST (Static security testing) of your infrastructure as codeStatic Analysis (SAST) with SonarQube | Glassminnow (and other code from the archives)Pivoting attack trafficDEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanningCross-Site Scripting (XSS) ExplainedGospider + hakrawler tools and automate the work #bugbounty in englishIntroduction to Snyk Code (Developer-first SAST)What is SAST and DAST cybersecurity testingSonarQube: How to run Static Code Scanning?Bug Bounty Live Recon - Grabbing Domains!How to Analyze Code for VulnerabilitiesNon-Printable Characters! December Tip of the Day #26