Security and Modern Software Deployment - AppSec EU 2015

Security and Modern Software Deployment - AppSec EU 2015

OWASP Foundation via YouTube Direct link

Attackers viewpoint

11 of 39

11 of 39

Attackers viewpoint

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Security and Modern Software Deployment - AppSec EU 2015

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Stack Exchange
  3. 3 Software Deployment
  4. 4 Trust
  5. 5 Dependencies
  6. 6 Repository Provider
  7. 7 Cloud Provider
  8. 8 Its All Software
  9. 9 Colonel Bashing
  10. 10 Other options
  11. 11 Attackers viewpoint
  12. 12 Rule 34 of security
  13. 13 Short Con
  14. 14 Get The Code
  15. 15 Root Shell
  16. 16 Choosing A Target
  17. 17 Push A New Version
  18. 18 Access Control
  19. 19 Lack of curation
  20. 20 Lack of digital signing
  21. 21 Linux repositories
  22. 22 Darker files
  23. 23 Profit Chels
  24. 24 Metasploit
  25. 25 Audit The Code
  26. 26 Metasploit Packages
  27. 27 Trusted Repository
  28. 28 Better Repository Security
  29. 29 Update Framework
  30. 30 Long Con
  31. 31 Open Source Libraries
  32. 32 Start Your Own Package Repository
  33. 33 If I Was A Bad Guy
  34. 34 Fixing This
  35. 35 Problem
  36. 36 Module Count
  37. 37 Python
  38. 38 Conclusion
  39. 39 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.