Completed
Attackers viewpoint
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Security and Modern Software Deployment - AppSec EU 2015
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Stack Exchange
- 3 Software Deployment
- 4 Trust
- 5 Dependencies
- 6 Repository Provider
- 7 Cloud Provider
- 8 Its All Software
- 9 Colonel Bashing
- 10 Other options
- 11 Attackers viewpoint
- 12 Rule 34 of security
- 13 Short Con
- 14 Get The Code
- 15 Root Shell
- 16 Choosing A Target
- 17 Push A New Version
- 18 Access Control
- 19 Lack of curation
- 20 Lack of digital signing
- 21 Linux repositories
- 22 Darker files
- 23 Profit Chels
- 24 Metasploit
- 25 Audit The Code
- 26 Metasploit Packages
- 27 Trusted Repository
- 28 Better Repository Security
- 29 Update Framework
- 30 Long Con
- 31 Open Source Libraries
- 32 Start Your Own Package Repository
- 33 If I Was A Bad Guy
- 34 Fixing This
- 35 Problem
- 36 Module Count
- 37 Python
- 38 Conclusion
- 39 Questions