Completed
black hat Anti-exploitation mitigations
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 black hat Disclaimer
- 3 black hat Introduction
- 4 black hat Trading software
- 5 black hat Unencrypted comms
- 6 black hat Denial of Service
- 7 black hat Trading languages supporting DLL imports
- 8 black hat Passwords stored unencrypted
- 9 black hat Trading data stored unencrypted
- 10 black hat Weak password policies
- 11 black hat Authentication
- 12 black hat Session still valid after logout
- 13 black hat Privacy mode
- 14 black hat Hardcoded secrets
- 15 black hat Anti-exploitation mitigations
- 16 black hat Root detection
- 17 black hat Other weaknesses
- 18 black hat Responsible disclosure
- 19 black hat Regulators
- 20 black hat Rating organizations
- 21 black hat Recommendations
- 22 black hat Black Hat Sound Bytes