Alvaro Muñoz NET Serialization Detecting and defending vulnerable endpoints

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=8cMmNSThVAM



Duration: 42:40
0 views
0


LocoMocoSec 2018 Kona Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2023-06-01SPI Flash for Bug Bounty Hunters with Nerdwell
2023-06-018 Ways to Almost Never Get a Dupe Again with InsiderPhD Katie Paxton Fear
2023-06-01Finding and Exploiting Hidden Functionality in Windows DLLs with Nerdwell
2023-06-01Finding Sensitive Data in Android Apps with Nerdwell
2023-06-01How I hacked 55 Banks & Cryptocurrency Exchanges with Alissa Knight
2023-06-01Hunting IDOR with Z winK Part 2
2023-06-01Recap and panel with Jeremiah Grossman, Troy Hunt, Gene Kim, Mike Arpaia
2023-06-01Scott Helme Revocation is broken, here's how we're fixing it
2023-06-01Troy Hunt I’m Pwned You’re Pwned We’re All Pwned
2023-06-01Alex Smolen Identity and Access Management Judgment Day
2023-06-01Alvaro Muñoz NET Serialization Detecting and defending vulnerable endpoints
2023-06-01Brian Campbell Beyond Bearer Token Binding as the Foundation for a More Secure Web
2023-06-01Devdatta Akhawe How I learnt to play in the CSP Sandbox
2023-06-01Emily Schechter The Trouble with URLs, and how Humans Don't Understand Site Identity
2023-06-01Gene Kim Top Infosec Lessons Learned Researching And Co Authoring The DevOps Handbook
2023-06-01Jeremy Long The Application Patching Manifesto
2023-06-01John Melton Starting an AppSec Program An Honest Retrospective
2023-06-01Kevin Gosschalk How bots decide what you can buy and how much you'll pay
2023-06-01Ksenia Peguero How to REACT to JavaScript Security Issues
2023-06-01Mario Heiderich XSS is dead We just don't get it
2023-06-01Mike Arpaia Starting, growing, and scaling your host intrusion detection efforts



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering