OWASP Top 10 Threats 2017 in .Net C#: 8.2 Insecure Deserialization Part 2 (Full Version)
This series of video presentations looks at the OWASP Top 10 Threat List from the viewpoint of .Net and C#. What the threat is and how we can protect ourselves against it.
This video looks at threat no. 8; Insecure Deserialization where we do a play by play coding session that demonstrated some insecure deserialization problems.
James Forshaw: Black Hat USA 2012 - Are You My Type? Breaking .net Sandboxes Through Serialization
https://www.youtube.com/watch?v=Xfbu-pQ1tIc
Muñoz & Mirosh - Def Con 25: - Friday 13th JSON attacks
https://www.youtube.com/watch?v=ZBfBYoK_Wr0
Alvaro Muñoz - Attacking .NET deserialization
https://www.youtube.com/watch?v=eDfGpu3iE4Q
Jonathan Birch - BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
https://www.youtube.com/watch?v=oxlD8VWWHE8
Code Examples shown in this video
https://github.com/shaneinsweden/OwaspTop10DotNet
Видео OWASP Top 10 Threats 2017 in .Net C#: 8.2 Insecure Deserialization Part 2 (Full Version) канала ShaneInSweden
This video looks at threat no. 8; Insecure Deserialization where we do a play by play coding session that demonstrated some insecure deserialization problems.
James Forshaw: Black Hat USA 2012 - Are You My Type? Breaking .net Sandboxes Through Serialization
https://www.youtube.com/watch?v=Xfbu-pQ1tIc
Muñoz & Mirosh - Def Con 25: - Friday 13th JSON attacks
https://www.youtube.com/watch?v=ZBfBYoK_Wr0
Alvaro Muñoz - Attacking .NET deserialization
https://www.youtube.com/watch?v=eDfGpu3iE4Q
Jonathan Birch - BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
https://www.youtube.com/watch?v=oxlD8VWWHE8
Code Examples shown in this video
https://github.com/shaneinsweden/OwaspTop10DotNet
Видео OWASP Top 10 Threats 2017 in .Net C#: 8.2 Insecure Deserialization Part 2 (Full Version) канала ShaneInSweden
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Building an Application Security Program - Module 101 - Why App Sec? Part 2](https://i.ytimg.com/vi/DYuTUzNes3s/default.jpg)
![Play by Play: Building an IDS with C# - Part 4 First Unit Test](https://i.ytimg.com/vi/bt1fTnzoF1A/default.jpg)
![Play by Play: Building an IDS with C# - Part 8 Network Capture With SharpPCap II](https://i.ytimg.com/vi/G54jws3CQT0/default.jpg)
![Play by Play: Building an IDS with C# - Part 12 Host Scan Detector](https://i.ytimg.com/vi/lK6FmM8KOWE/default.jpg)
![Building a World of Tanks MVC Web Application with C# - Part 4 Building the Website](https://i.ytimg.com/vi/ypgdwJQEUOA/default.jpg)
![Building a World of Tanks MVC Web Application with C# - Part 3 Getting a valid WoT Application Id](https://i.ytimg.com/vi/g_MZRiBNLII/default.jpg)
![Building an Application Security Program - Module 101 - Why App Sec? Part 1](https://i.ytimg.com/vi/adCuUhdArrw/default.jpg)
![Splunk Security Datasets Project - Bonus Part 5](https://i.ytimg.com/vi/-ZulRGweZxg/default.jpg)
![Building a HTTP Response Headers security control in C# Part 2](https://i.ytimg.com/vi/XJZi79xdJiI/default.jpg)
![The View - Underneath the Lights - Live from Stockholm 2016](https://i.ytimg.com/vi/IDW3kLz7C7I/default.jpg)
![Investigating a Hack with Splunk and the Cyber Kill Chain Part 4](https://i.ytimg.com/vi/E8Y9DiL9KvA/default.jpg)
![Play by Play: Building an IDS with C# - Part 6 Handling intrusion detection rules](https://i.ytimg.com/vi/WKQv11Rnfeg/default.jpg)
![Building a HTTP Response Headers security control in C# Part 3](https://i.ytimg.com/vi/dFJIDVk09SE/default.jpg)
![OWASP Top 10 Threats 2017 in .Net C#: 8.2 Insecure Deserialization Part 3](https://i.ytimg.com/vi/EyW9VCTzDWU/default.jpg)
![Play by Play: Building an IDS with C# - Part 9 Reporting Part I](https://i.ytimg.com/vi/KuTdOnSHv9Q/default.jpg)
![OWASP Top 10 Threats 2017 in .Net C#: 8.1 Insecure Deserialization Part 1](https://i.ytimg.com/vi/lt0Ku4OsPOY/default.jpg)
![Play by Play: Building an IDS with C# - Part 13 Port Scan Detector](https://i.ytimg.com/vi/WdbzcOIxPZg/default.jpg)
![Play by Play: Building an IDS with C# - Part 3 Visual Studio setup](https://i.ytimg.com/vi/bVUJ3Rv9Rtg/default.jpg)
![Building a HTTP Response Headers security control in C# Part 1](https://i.ytimg.com/vi/JCFKTQt4ivQ/default.jpg)
![Building an Application Security Program - Module 103 - App Sec Activities](https://i.ytimg.com/vi/AG7OP_AwPDA/default.jpg)