Next-Level App Hacking: Threat Modeling for Better Attacks

Next-Level App Hacking: Threat Modeling for Better Attacks

Subscribers:
64,099
Published on ● Video Link: https://www.youtube.com/watch?v=zI6pAMID6qU



Duration: 35:15
698 views
21


Attempting to hack a web or mobile application can seem daunting. How do we even start? What kind of attacks should we test? Threat modeling is usually thought of as a tool that defenders use to help them protect their systems. In this session however, we'll talk about how threat modeling can be used by hackers in their penetration tests to make sure they're attacking the right things in the right ways. Never heard of threat modeling before? That's OK!! Using a real-life web application, you'll learn about threat modeling and how it helps you figure out what is most important, why it's important, and use that information to build better attacks.

Speaker Bio
Alyssa Miller @AlyssaM_Infosec, Hacker & Security Researcher
Alyssa Miller is a hacker, security advocate, professional, and public speaker with over 15 years of experience in cyber security. She believes that in today’s inter-connected world, protecting privacy and building trust with secure systems are critical to protecting our way of life. As a result, she discusses real-world issues that affect people both within and outside the security community.

SANS Cyber Camp for Teens is a FREE event for teens to learn cybersecurity topics and trends from the leading experts in the industry! If you're interested in a career in cyber security and you attend high school or junior high, these videos are for you! The camp brings together a group of cyber security experts, discussing the latest topics and trends in IT Security.

#newtocyber #cybercamp #gettingstartedincybersecurity #threatmodeling







Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
new to cybersecurity
cybercamp
how to get into cybersecurity
cyber security jobs
application hacking
hacking
app hacking
threat modeling