7 Podcast Episodes
Alex Stamos and Scott Stender: Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
Alex Stamos and Scott Stender: Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
Web Services represent a new and unexplored set of security-sensitive technologies that have been widely deployed by lar... Read more
4 Jun 2006
•
1hr 12mins
Alex Stamos and Scott Stender: Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
Alex Stamos and Scott Stender: Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
Web Services represent a new and unexplored set of security-sensitive technologies that have been widely deployed by lar... Read more
4 Jun 2006
•
1hr 12mins
Scott Stender: Attacking Internationialized software
Scott Stender: Attacking Internationialized software
Every application, from a small blog written in PHP to an enterprise-class database, receives raw bytes, interprets thes... Read more
4 Jun 2006
•
50mins
Scott Stender: Attacking Internationialized software
Scott Stender: Attacking Internationialized software
"Every application, from a small blog written in PHP to an enterprise-class database, receives raw bytes, interprets the... Read more
4 Jun 2006
•
50mins
Scott Stender: Attacking Internationalized Software (English)
Scott Stender: Attacking Internationalized Software (English)
"Every application, from a small blog written in PHP to an enterprise-class database, receives raw bytes, interprets the... Read more
4 Jun 2006
•
1hr 32mins
Scott Stender: Blind Security Testing - An Evolutionary Approach
Scott Stender: Blind Security Testing - An Evolutionary Approach
The vast majority of security testing relies on two approaches: the use of randomly generated or mutated data and the us... Read more
9 Jan 2006
•
58mins
Scott Stender: Blind Security Testing - An Evolutionary Approach
Scott Stender: Blind Security Testing - An Evolutionary Approach
The vast majority of security testing relies on two approaches: the use of randomly generated or mutated data and the us... Read more
9 Jan 2006
•
58mins