How to Conduct a Product Security Test and How it Fits Into the Larger Security Strategy
via YouTube
Overview
Syllabus
Intro
We are here to help
Product complexity
Background Knowledge
Security Concerns
Continuous Improvement Models
Wasps
Why do coding mistakes happen
Not every device is built with security
Use strong passwords
Software updates
Protecting intellectual property
Security researchers
How we conduct security product security reviews
Initial system investigation
Additional domain knowledge
Product analysis
WASP Top 10
Dot Peek
Decompile
Static Analysis
Static Analysis Tools
Gartner Magic Quadrant
Vulnerability Composition Analysis
Vulnerability Composition Analysis Output
Static Analysis Tool
Visual Studio
Dynamic Analysis
Web Interface
Fuzz Testing
Manual Hacking
Burp Suite
Code Review
Proof of Concept
Command Injection
Keep it Ethical
Reporting
Summary