Owasp

Owasp смотреть последние обновления за сегодня на .

OWASP Top 10 2021 - The List and How You Should Use It

32480
650
28
00:08:51
23.11.2021

The OWASP Top 10 is the go-to document on application security awareness. This video features the OWASP Top 10 explained with examples. Boost your DevSecOps and improve your threat hunting capabilities based on the findings from the OWASP community. However, use the OWASP Top 10 wisely. Although packed with useful information, the OWASP Top 10 is not a substitute for application security testing techniques or managed detection and response services. Instead, use the OWASP Top 10 in conjunction with professional cyber security protocols to get the best out of your application security. The risk is real. Subscribe to Cyber Citadel. - CHAPTERS 0:00 - Intro 0:30 - What is OWASP? 1:08 - How does OWASP Compile Their Top 10? 1:56 - The OWASP Top 10 2021 List? 7:35 - How Should You Use the OWASP Top 10? - MORE AT: Cyber Citadel Website: 🤍 Mitre ATT&CK: The Framework and Why You Should Use it 🤍 Follow us on: YouTube: 🤍 Vimeo: 🤍 LinkedIn: 🤍 Instagram: 🤍 Twitter: 🤍 #OWASPTop10 #cybersecuirty #cybercitadelOWASP

OWASP Zap Tutorial

61750
2288
97
00:07:35
08.05.2021

Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: 🤍 Ethical Hacker | Penetration Tester | Cybersecurity Consultant About The Trainer: Loi Liang Yang Certified Information Systems Security Professional Certified Ethical Hacker CompTIA Security+ Social networks: 🤍 🤍 🤍 🤍 Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

What Is OWASP?

2560
39
2
00:12:20
07.03.2021

Great introduction to OWASP. This video was created by Lewis Ardern and presented at BSides San-Francisco (BSidesSF) on March 6th, 2021 Source video on Karl Baskin Channel: 🤍 Presentation on BSidesSF 2021 LiveStream: 🤍

What is the OWASP Top 10? | AppSec 101

10738
196
21
00:14:34
09.03.2021

In Episode 11 of our AppSec 101 series, Katie Crabtree answers the question, "What is the OWASP Top 10?" Katie discusses the OWASP Top 10 vulnerabilities and what organizations can do to secure their organizations against these AppSec risks. OWASP stands for the Open Web Application Security Project and is focused on improving the security of software. Watch this episode to learn more. Intro 00:00 What is the OWASP Top 10? 1:15 How does the OWASP Top 10 get determined? 2:00 Why is the OWASP Top 10 important? 4:00 Detecting the OWASP Top 10 vulnerabilities 5:00 What's on the current OWASP Top 10 list? 5:45 Sensitive Data Exposure 7:25 Cross-Site Scripting (XSS) 8:40 Prevention 9:26 Using Components with Known Vulnerabilities 10:55 Best Practices 12:16 LEARN MORE about the OWASP Top 10: 🤍 LEARN MORE about Fortify: 🤍 LEARN MORE about how Micro Focus was named a leader in the Gartner MQ for Application Security Testing: 🤍 LEARN MORE about how Fortify received the highest score in the Gartner Critical Capabilities for Application Security Testing report for the Enterprise use case AND the Mobile and Client use case: 🤍 SUBSCRIBE TO FORTIFY UNPLUGGED: 🤍 CONNECT with the Fortify Online Community: 🤍 - Connect with peers and share your knowledge - Find solutions and answers to your technical questions - Stay informed on new releases and product enhancements - Access downloads, demos, videos and support tips

OWASP TOP-10 | 2021 | Обзор классификации векторов атак и уязвимостей Web-приложений.

3642
129
12
00:21:08
17.12.2021

В этом видео я сделал краткий обзор TOP-10 классификации векторов атак и уязвимостей Web-приложений от OWASP на 2021 год. 🔥 ПОЛЕЗНЫЕ РЕСУРСЫ 🔥 💡 Официальный сайт OWASP 🤍 💡 OWASP Top 10 - 2021 🤍 💡 OWASP Web Security Testing Guide 🤍 💡 Android Security Testing Guide 🤍 💡 iOS Security Testing Guide 🤍 💡 База знаний (Security Testing) 🤍 💡 Web Security Testing Guide Checklist 🤍

A Starters Guide to Pentesting with OWASP

51203
1553
37
00:25:46
23.07.2020

What is OWASP and what is the OWASP Top 10? Quick review of top 10 categories and types of vulnerabilities. Concludes with a detailed testing guide walkthrough.

OWASP Top 10 (Security Risks and Vulnerabilities)

47072
683
24
00:48:24
09.03.2021

Keeping up to date on current security threats is a full-time job. As a developer, you already have one. OWASP is a community-based team of security experts that can influence the way you code future projects, analyze your current code, and grow as a developer. PUBLICATION PERMISSIONS: Original video was published with the Creative Commons Attribution license (reuse allowed). Link: 🤍

Web Application Analysis: OWASP ZAP

27800
588
32
00:06:06
19.01.2020

Every web application deployed onto the internet has software engineering flaws and are subjected to automated scans from hacking tools. This video will utilize OWASP Zap to discover vulnerabilities in a website for access. Video is strictly for educational purposes. Ethical Hacker | Penetration Tester | Cybersecurity Consultant About The Trainer: Loi Liang Yang Certified Information Systems Security Professional Certified Ethical Hacker CompTIA Security+ Social networks: 🤍 🤍 🤍 🤍 Subscribe now: Learn about ethical hacking Learn about wireless hacking Learn about android hacking Learn about penetration testing Learn about linux

TOP 10 OWASP Vulnerabilities Explained with Examples (Part I)

87298
721
19
00:15:04
08.06.2019

In this video, we are going to learn about top OWASP (Open Web Application Security Project) Vulnerabilities with clear examples. Check Penetration Testing Complete Guide: 🤍

Тестирование безопасности / OWASP TOP 10 уязвимостей

18295
1033
72
00:31:44
09.01.2022

🚀 Все мои курсы и полезные материалы: 🤍 Сегодня поговорим о тестировании безопасности и, в частности, о такой организации как OWASP и TOP 10 уязвимостей от нее. 😎Мой курс на Udemy: 🤍 😎 Полезные ссылки из видео: Официальная страница OWASP TOP 10 2021 на английском языке: 🤍 Официальная страница OWASP TOP 10 2021 на русском языке: 🤍 Атака с большим будущим: за что SSRF поместили в ТОП-10 киберугроз 🤍 Три топ-уязвимости по версии OWASP TOP-10 🤍 😎 Ссылка на полезные ресурсы для тестировщика от меня: 🤍 😎 Текстовая версия курса "Тестировщик с нуля" 🤍 😎 Доступные схемы из занятия (некоторые необходимо скачать для корректной работы): 🤍 Приятного просмотра :) P.S. Все таймкоды есть в описании 😉 _ 00:00 - Что такое OWASP и TOP 10 уязвимостей? 05:46 - Тестирование безопасности - нефункциональный вид 06:40 - A01:2021 - Нарушение контроля доступа 11:45 - A02:2021 - Сбои в криптографии 13:46 - A03:2021- Инъекции 16:10 - A04:2021- Небезопасный дизайн 19:02 - A05:2021- Неправильная конфигурация 19:49 - A06:2021 - Уязвимые и устаревшие компоненты 20:50 - A07:2021- Ошибки идентификации и аутентификации 23:57 - A08:2021- Нарушение целостности данных и программного обеспечения 27:18 - A09:2021 - Журнал безопасности и сбои мониторинга 29:11 - A10:2021 - Подделка запросов со стороны сервера (SSRF) 🤠 Я В ИНТЕРНЕТЕ: - Подпишись на этот YouTube канал :) - Поддержать канал: 🤍 - Telegram (много плюшек): 🤍 - Telegram (общение только о тестировании): 🤍 - Telegram (флудилка): 🤍 - Telegram (хранилище): 🤍 - Telegram (менторы и менти): 🤍 - Discord (все каналы в одном месте): 🤍 - Instagram: 🤍 - TikTok: 🤍 - Яндекс Дзен: 🤍 Music: 🤍bensound.com #OWASP #OWASPTOP10 #тестированиебезопасности

OWASP TOP-10 на русском [Введение]

10376
342
9
00:07:52
27.01.2020

Всем привет! Я Twost и сегодня мы поговорим о безопасности. В этом ролике мы пробежимся по всем пунктам OWASP TOP-10 кратко, в качестве вводной информации для последующих роликах с разбором всех уязвимостей. Я постарался предоставить базовую информацию по стандарту OWASP TOP 10 на русском языке. Со стандартом OWASP пентестер будет знать как найти уязвимость, взломать веб-приложение или сайт, а также как её классифицировать, а программист будет знать от каких уязвимостей защищаться. Надеюсь ролик будет вам полезен. Наш телеграм канал: 🤍 Наша телеграм группа: 🤍 #ityoutubersru #взлом #owasp

OWASP top 10 vulnerabilities بالعربي

8463
186
16
00:58:56
02.05.2020

دردشة تقنية مع الدكتور محمد الشبوطي يتحدث فيها عن النقاط العشرلأختراق المواقع وكيفية تجنبها

Top 10 OWASP Vulnerabilities for API Security Explained! - API Cybersecurity 101

117956
12962
41
00:11:43
18.02.2022

⭐ OWASP API Security Vulnerabilities Explained in 10 minutes! Watch API Cybersecurity 101 with Brenton House. 👇🏻👇🏻👇🏻 Read More Below! 👇🏻👇🏻👇🏻 (Bonus links included in show notes below) ▬▬▬▬▬ 🛡️ SHIELDS UP 🛡️ ▬▬▬▬▬ API Cybersecurity 101 - Everything you wanted to know about API Security Best Practices and Digital Transformation with Senior Digital Strategist, Brenton House! ▬▬▬▬▬ 🟣 API SECURITY 🟣 ▬▬▬▬▬ APIs are everywhere and API Security has never been more important than it is right now. API abuses have risen in the past few years and it is difficult to go even a week without reading about another API that has been attacked. By securing your APIs using API Security solutions and API Management best practices, you can mitigate attacks and protect your organization, your customers, your data, and your reputation. So What is API Security Shift Left and Shield Right? ▬▬▬▬▬ 🟢 WHAT IS OWASP? 🟢 ▬▬▬▬▬ OWASP stands for "Open Web Application Security Project" and they are an international non-profit organization dedicated to web application security. ▬▬▬▬▬ ⏪ SHIFT LEFT ⏪ ▬▬▬▬▬ "Shift Left" is referring to is shifting your security focus to the beginning of the API Lifecycle process and to integrate it into the design and development of an API which works to help protect it in every other step of the API Lifecycle all the way to the retirement of an API. ▬▬▬▬▬ ⏩ SHIELD RIGHT ⏩ ▬▬▬▬▬ "Shield Right" is talking about the emphasis on continuing to protect your APIs at runtime and beyond. Doing this will allow you to provide a defense against unknown attacks using a combination of AI/ML and defined algorithms and policies. ▬▬▬▬▬ 🟡 OWASP API SECURITY 🟡 ▬▬▬▬▬ What is the OWASP Top 10 for API Security? ⭐ Broken Object Level Authorization ⭐ Broken User Authentication ⭐ Excessive Data Exposure ⭐ Lack of Resources & Rate Limiting ⭐ Broken Function Level Authorization ⭐ Mass Assignment ⭐ Security Misconfiguration ⭐ Security Misconfiguration ⭐ Injection ⭐ Improper Assets Management ⭐ Insufficient Logging & Monitoring ▬▬▬▬▬ 🔵 BONUS LINKS 🔵 ▬▬▬▬▬ ⚡ So you think your API is secure? 👉🏼 🤍 ⚡ What is API Security 👉🏼 🤍 ⚡ OWASP 👉🏼 🤍 ⚡ OWASP Top Ten List for API Security 👉🏼 🤍 ⚡ OWASP Top Ten List for Web Applications 👉🏼 🤍 ⚡ Free Trial for webMethods API Gateway 👉🏼 🤍 ▬▬▬▬▬ 🟠 WHAT IS AN API? 🟠 ▬▬▬▬▬ Basically, it is non-human systems that talk to each other in an agreed-upon way! API Management, which includes things like API Gateway and API Developer Portal, allows your APIs to scale while prioritizing API Security. This is all part of API First methodology which helps drive the API Economy. Learning to treat your API as a Product, giving it proper budget, resources, and management, helps organizations succeed in releasing API Platforms that users, customers, and developers LOVE! ▬▬▬▬▬ ❤️ LEVEL-UP ❤️ ▬▬▬▬▬ 🎬 Watch ▪ Check out more API videos! 🤍 ( bring your own 🍿 ) 🔔 Subscribe ▪ Get notified when new content is available! 👍🏻 Thumbs Up! ▪ Love APIs? 😍 Like our video and share it! 💬 Comment ▪ Let us know what you think of this episode! ▬▬▬▬▬ 👀 LET'S CONNECT 👀 ▬▬▬▬▬ ⭐ LinkedIn 👉🏼 🤍 ⭐ Twitter 👉🏼 🤍 ⭐ YouTube 👉🏼 🤍 ⭐ Medium 👉🏼 🤍 ⭐ Dev.to 👉🏼 🤍 ⭐ Software AG 👉🏼 🤍 ▬▬▬▬▬ ⚡ SUPERCHARGE ⚡ ▬▬▬▬▬ ⚡ Digital Strategist 👉🏼 🤍 ⚡ Software AG Blog 👉🏼 🤍 ⚡ API Knowledge Portal 👉🏼 🤍 ▬▬▬▬▬ ❓ API QUESTIONS? ❓ ▬▬▬▬▬ We have API Answers for API Friends! Watch API Shorts on YouTube! 👉🏼 🤍 ▬▬▬▬▬ 📕 CHAPTERS 📕 ▬▬▬▬▬ 00:00 - API Cybersecurity 101 Intro 01:20 - API Security 02:00 - Securely Manage your APIs 02:26 - OWASP Top 10 Vulnerabilities 02:40 - What is an API? 03:21 - What is API Security? 03:35 - What is OWASP? 04:09 - Broken Object Level Authorization 05:06 - Broken User Authentication 05:33 - Excessive Data Exposure 06:00 - Lack of Rate Limiting 06:32 - Broken Function Level Authorization 07:01 - Mass Assignment 07:37 - Security Misconfiguration 08:04 - Injection 08:40 - Improper Assets Management 09:51 - Insufficient Logging & Monitoring 10:37 - Future of API Security 11:22 - More API Security videos to watch ▬▬▬▬▬ 🎬 DIGITAL TOOLS 🎬 ▬▬▬▬▬ Apple Final Cut Pro 👉🏼 🤍 Adobe After Effects 👉🏼 🤍 mmhmm 👉🏼 🤍 ▬▬▬▬▬ 📘 CREDITS 📘 ▬▬▬▬▬ All music is used with proper license and permission of the original creators for use in monetized and non-monetized videos on this YouTube channel. #api #OWASPtop10 #cybersecurity

Webinar - OWASP top 10: dos conceitos à prática (com Cristian Souza)

3913
221
17
01:12:20
05.11.2021

Você sabe o que é o OWASP top 10? Se você trabalha na área de programação e desenvolvimento seguro, é bem provável que sim, mas caso sua resposta seja não, não se preocupe! Neste webinar, Cristian Souza, especialista em Desenvolvimento Seguro, professor IDESP e consultor de Cyber Security na Daryus Consultoria, abordará o assunto e tirará todas as suas dúvidas sobre o tema. Conheça o curso de Web Application Security: 🤍 Entre para a nossa comunidade no Telegram↴ 🤍 Mais materiais gratuitos aqui ↴ 🤍 Você também pode nos encontrar ↴ Facebook ☛ 🤍 Instagram ☛ 🤍 Conheça nosso site ☛ 🤍 Blog ☛ 🤍 Gostou do vídeo? Deixa seu like! Inscreva-se no canal para mais conteúdos como este :)

OWASP Top 10 Vulnerabilities | Part 1 | PC 3

6971
143
10
00:14:03
15.05.2022

OWASP Top 10 Vulnerabilities | Part 1 | PC 3 - We have come up with Tutorial Videos for SAS Exam Preparation (Sub-ordinate Audit / Accounts Service Examination). SAS Exam is conducted by CAG (Comptroller & Auditor General of India) for Promotion / Confirmation to the post of AAO (Assistant Audit / Accounts Officer) for the officials of Indian Audit & Accounts Department (IA&AD). Watch Part 2 here: 🤍 Stay tuned for further videos You can contact us on, FACEBOOK: 🤍 Instagram: 🤍 Twitter: 🤍 WHATSAPP: 7240963350 E-MAIL: TheStolenNotes4U🤍gmail.com - To stay tuned, please subscribe to our channel: 🤍 - Music Info: Cinematic Documentary - AShamaluevMusic. Music Link: 🤍 - #OWASPTOP10 #OWASP #PC3

OWASP Top 10 Web 2021

4949
164
2
00:57:30
27.10.2021

Mantente a la vanguardia de los grandes cambios que vienen en la industria de la seguridad de aplicaciones con nuestro curso OWASP Top 10 Web 2021: ✔️ 🤍 ¡Oferta por tiempo limitado!

Web Application Security and OWASP - Top 10 Security Flaws with Examples

105221
1237
27
00:41:16
03.12.2018

Web Application Security and OWASP - Top 10 Security Flaws with Examples LEARN "Big Picture" of FULL-STACK, CLOUD, AWS, MICROSERVICES with DOCKER and KUBERNETES in *30 MINUTES* - 🤍 Follow Ranga on LinkedIn - 🤍 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Our Top 10 Courses ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 30+ Courses. 500,000+ Learners. Amazing Reviews. ► 1. Master DEVOPS with Docker, Kubernetes and Azure DevOps - 🤍 ► 2. Become FULL STACK DEVELOPER with SPRING BOOT and REACT - 🤍 ► 3. Master MICROSERVICES with Spring Boot and Spring Cloud - 🤍 ► 4. Become AWS CERTIFIED Solution Architect - 🤍 ► 5. Learn SPRING in 100 Steps - 🤍 ► 6. JAVA PROGRAMMING for Complete Beginners in 250 Steps - 🤍 ► 7. Go FULL STACK DEVELOPER with Spring Boot and Angular - 🤍 ► 8. Master Java Unit Testing with Spring Boot & Mockito - 🤍 ► 9. Spring INTERVIEW GUIDE - 🤍 ► 10. Java INTERVIEW GUIDE - 🤍 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ FREE Courses For You ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ► 01. Learn Full Stack, AWS, Cloud, and Microservices - 🤍 ► 02. Learn Spring and Spring Boot in 5 DAYS - 🤍 ► 03. AWS Certified Solutions Architect Associate - 🤍 ► 04. Getting Started with DevOps and Cloud - 🤍 ► 05. Learn Docker in 10 Steps - 🤍 ► 06. Learn Kubernetes in 10 Steps - 🤍 ► 07. Learn AWS in 10 Steps - 🤍 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Other Recommendations ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ► MOST WATCHED VIDEOS - 🤍 ► 25+ PLAYLISTS - 🤍 BEST SELLING COURSES - 30 DAY MONEY BACK GUARANTEE ► Python For Beginners - Java to Python in 100 Steps > 🤍 ► Master Microservices with Spring Boot and Spring Cloud > 🤍 ► Spring Master Class - Beginner to Expert > 🤍 ► Your First Steps from Programmer to Software Architect > 🤍 ► Master Hibernate and JPA with Spring Boot in 100 Steps > 🤍 ► Spring Framework Interview Guide - 200+ Questions & Answers > 🤍 ► Master Java Web Services and REST API with Spring Boot > 🤍 ► Learn Spring Boot in 100 Steps - Beginner to Expert > 🤍 ► Java Interview Guide : 200+ Interview Questions and Answers > 🤍 ► Mockito Tutorial : Learn mocking with 25 Junit Examples > 🤍 ► Spring MVC For Beginners : Build Java Web App in 25 Steps > 🤍 - Follow us on Social Media - ► TWITTER > 🤍 ► FACEBOOK > 🤍 ► INSTAGRAM > 🤍 ► LINKEDIN > 🤍

VULNERABILIDADES EN APLICACIONES WEB // ¿Qué es OWASP y cuál es su rol con las vulnerabilidades web?

6255
277
28
00:17:22
30.07.2020

¿Cuál es la diferencia entre una vulnerabilidad de sistema operativo y una vulnerabilidad de aplicacion web? ¿Por qué es importante distinguirlas? Melinton nos comparte hoy un nuevo video relacionado al mundo de vulnerabilidades en aplicaciones web. Y más importante, nos comenta acerca de la organización conocida como OWASP, la cual mantiene documentación muy valiosa acerca de este tipo de vulnerabilidades, desde sql injection, pasando por XSS (Cross-site scripting) y muchas más. ¡Y quédate hasta el final para descubrir que nueva serie de videos estaremos lanzando relacionados a las vulnerabilidades en aplicaciones web! Recuerden visitar los cursos gratis disponibles en nuestro canal: * Introducción a la Seguridad Informática: 🤍 De igual manera, pueden visitar los cursos más profundos que tenemos disponibles en Udemy: * CISSP Edición premium: ¡Todos los dominios! (¡¡+80% de descuento!! Todo el mes de Agosto 2020) - 🤍 * Hacking Ético y Pentest Avanzado (¡¡67% de descuento!!) - 🤍 Por último, no olviden pasar a formar parte de nuestra comunidad en Facebook: * 🤍

[OWASP Top 10] A1: Injection - Wstrzyknięcie

17653
490
14
00:13:36
07.02.2019

OWASP Top 10 to zbiór dziesięciu najpopularniejszych błędów bezpieczeństwa, które można spotkać na stronach internetowych. Rozpoczynam nowy cykl filmów właśnie na ten temat. Są one przeznaczone dla szerszego grona programistów a nie tylko osób zajmujących się bezpieczeństwem. Skupiam się tutaj na ogólnym przedstawieniu koncepcji a nie na szczegółowym wytłumaczeniu każdego z błędów. Można to więc potraktować jako punkty, na które warto zwrócić uwagę podczas programowania. Grupa na Facebooku: 🤍 Subskrybuj kanał: 🤍 OWASP: 🤍 Dzisiaj A1: Injection czyli wstrzyknięcie. Błędy tego rodzaju powstają jeżeli nie traktujemy danych od użytkownika jako potencjalnie niebezpiecznych i trafiają one bezpośrednio do zapytania lub jakiegoś polecenia. Przy pomocy odpowiednio spreparowanego ciągu znaków atakujący ma możliwość pobrania innych rekordów lub wywołania innych komend niż wcześniej zakładano. Najczęściej tego rodzaju podatności można spotkać w kodzie odpowiedzialnym za zapytania do różnego rodzaju baz danych. Mogą one występować również gdy używamy funkcji służących do wykonania komend systemowych. Kluczowe jest zatem odpowiednie filtrowanie danych pochodzących z zewnątrz. W odniesieniu do SQL Injection - chodzi tutaj o Prepared Statements. Zamiast przekazywać parametry bezpośrednio do zapytania - oznaczamy je zazwyczaj używając pytajnika. A ich podmianą zajmuje się odpowiednia funkcja, która dba o zabezpieczenie całości. Free B-Roll provided by 🤍 Computer Hard Drive by Beachfront CC BY 3.0 Icon made by Freepik 🤍flaticon.com #od0dopentestera #owasp #injection

محاضرة OWASP API Top 10 - OWASP Amman Chapter

7824
297
13
01:08:16
24.10.2020

نتمنى لكم الفائدة و لا تنسوا متابعتنا على الروابط التالية : حساب المهندس محمد خريشة على الفيسبوك : 🤍 حساب المهندس محمد خريشة على تويتر : 🤍 صفحة المهندس محمد خريشة على الفيسبوك : 🤍 رابط صفحة تكناوي على فيسبوك : 🤍 رابط حساب تكناوي على تويتر : 🤍 حساب تكناوي على لينكدإن : 🤍

OWASP libera lista das 10 vulnerabilidades em software mais preocupantes em 2021

5692
894
20
00:15:55
29.09.2021

Mais informações: 🤍 Meu curso "Segurança no Desenvolvimento de Software": 🤍

OWASP DefectDojo - The Heart of your AppSec Automation

6131
90
8
01:37:22
02.05.2021

OWASP Switzerland brings you another high profile talk directly from the source. Defect Dojo project leads Aaron Weaver and Matt Tesauro as well as contributor/moderator Fred Blaise will initiate us into the magic of Defect Dojo. Abstract You’re tasked with ‘doing AppSec’ for your company and you’ve got more apps and issues than you know how to deal with. How do you make sense of the different tools outputs for all your different apps? DefectDojo can be your one source of truth and become the heart of your AppSec automation program. DefectDojo grew out of a Product Security program 8 years ago and was created by AppSec people for AppSec people. In this talk, you’ll learn about DefectDojo and how to make the most of the many features it offers including its REST-based API. DefectDojo can be your one source of truth for discovered security vulnerabilities, report generation, aggregation of over 80 different security tools, inventory of applications, tracking testing efforts and metrics on the AppSec program. DefectDojo was the heart of an AppSec automation effort that saw an increase in assessments from 44 to 414 in two years. Don't you want 9.4 times more output from your AppSec program? It's time to ditch spreadsheets and get DefectDojo. You can find more about Defect Dojo on their website: 🤍 Our speakers for this talk are: * Matt Tesauro: Project Lead DefectDojo. * Fred Blaise: Moderator DefectDojo. As he lives in Switzerland, we can consider him the “local branch of DefectDojo” ;-) Recorded: 2021-04-14 Slides: 🤍 Chapter page: 🤍 Upcoming events: 🤍

La liste préférée des Hackers ! Top 10 d'OWASP !

1259
36
19
00:20:09
14.11.2022

On passe en revue la liste préférée des Hackers ! Top 10 d'OWASP ! OWASP liste les 10 grandes familles de vulnérabilités. Le TOP 10 est très utilisé par les hackers et pentesters pour étduer les CWE (Common Weakness Enumeration) et rechercher les CVE (Common Vulnerabilities and Exposures). Mais pas assez à mon goût par les développeurs ! La cyber sécurité doit être une préoccupation pour les développeurs ! Rejoignez le Discord : 🤍 Participez sur Twitch : 🤍  #owasp top 10 #owasp top 10 explained with examples #owasp top 10 2021 #developpeur #cybersécurité

An Introduction to OWASP Top 10 Vulnerabilities - SQL Injections

55
2
0
00:17:31
26.07.2022

This video demonstrates how SQL injections occur in web applications This video is originally part of my An Introduction to OWASP Top 10 Vulnerabilities Udemy course

🔴 2021 OWASP Top 10: Secure Your Web Applications

242
7
1
00:57:55
11.12.2021

Regardless of whether you work on a CRM, ERP, ECOM, CMS, or backend system, it’s important to stay on top of the most critical security risks and vulnerabilities. The newly released OWASP Top 10:2021 is a great starting point to bring awareness to the biggest threats to your projects. Join our LIVE Podcast on Friday, December 10, 2021, as we share with you real examples of what we see in the field through our pentesting engagements. OWASP stands for the Open Web Application Security Project, an online community that produces articles, methodologies, documentation, tools, and technologies in the field of web application security. These are the 2021 OWASP Top 10: 1 - Broken Access Control 2 - Cryptographic Failures 3 - Injection 4 - Insecure Design (NEW) 5 - Security Misconfiguration 6 - Vulnerable and Outdated Components 7 - Identification and Authentication Failures 8 - Software and Data Integrity Failures (NEW) 9 - Security Logging and Monitoring Failures 10 - Server-Side Request Forgery (NEW) #pentesting #owasp #websecurity

¿Qué es OWASP?, Open Web Application Security Project

23503
432
16
00:52:04
10.04.2017

¿Qué es OWASP?, Open Web Application Security Project o Proyecto Abierto de Seguridad en Aplicaciones Web, en esta charla que se realiza durante el OWASP Latam Tour 2017, capítulo manizales 00:00 - Inicio de Charla 00:17 - ¿Quién es Jaime Restrepo (DRAGONJAR)? 00:29 - ¿Qué es OWASP (Open Web Application Security Project)? 02:18 - ¿Qué tiene OWASP para ofrecernos? 04:23 - Documentación de OWASP 08:56 - Top 10 OWASP 10:03 - A10. Redirección y reenvíos no válidos 11:16 - A9. Uso de componentes con vulnerabilidades conocidas 12:30 - A8. Falsificación de peticiones en sitios cruzados 13:28 - A7. Protección Insuficiente en la Capa de Transporte 13:48 - A6. Datos Sensibles Expuestos 14:21 - A5. Defectuosa Configuración de Seguridad 15:28 - A4. Referencia Directa Insegura a Objetos 16:24 - A3. Secuencia de Comandos en Sitios Cruzados 17:38 - A2. Pérdida de Autenticación y Gestión de Sesiones 19:12 - A1. Inyección 21:40 - Herramientas OWASP 22:11 - Herramienta Zed Attack Proxy (ZAP) 28:45 - Web GOAT (Página para practicar vulnerabilidades) 30:07 - Herramienta Offensive Web Testing Framework (OWTF) 31:21 - ¿Cuál es la diferencia entre un escaneo de NMAP y las herramientas de OWASP? 32:21 - ¿Qué es Dirbuster? 33:54 - ¿Qué es ESAPI(Enterprise Security API)? 36:08 - ¿Qué Lenguajes de Programación se soportan en ESAPI? 37:53 - Capítulos OWASP 39:26 - Capítulo Manizales 47:14 - Invitación a conocer los Capítulos 48:05 - Eventos OWASP 48:57 - OWASP LATAM TOUR 51:40 - Despedida Si te ha gustado dale "Me Gusta" y Suscríbete (🤍 que ayuda mucho! Más de DragonJAR.tv : - Youtube: DragonJARtv (🤍 Facebook: (🤍 Twitter: 🤍DragonJAR (🤍 Instagram: Dragon.JAR (🤍 Discord: 🤍 Blog: Comunidad DragonJAR (🤍 Telegram: DragonJAR (🤍 TikTok: 🤍DragonJAR (🤍 Kwai: (🤍 Linkedin: (🤍 -

What Is OWASP Top 10 ? Best For Ethical Hackers 🔥🔥

19341
772
100
00:06:51
02.01.2019

Hey guys !! In this video, I will be talking about the famous OWASP Top 10 documentation which is available online which lists top 10 current web application security flaws. This topic is very important for ethical hackers who want to become bug bounty hunter. OWASP TOP 10 : 🤍 = ▶ Stay Safe On Internet ▶ Stay Legal Always ▶ Videos Of Ethical Hacking, Tips n Tricks, Cyber Security & Technology. -CONNECT WITH ME ♥️ Twitter - 🤍 ♥️ Facebook Page - 🤍 ♥️ Instagram - 🤍 ♥️ Instagram TV - 🤍 ♥️ Telegram Channel - 🤍 ♥️ Telegram Group - 🤍 - Note : ALL THE IMAGES/PICTURES SHOWN IN THE VIDEO BELONGS TO THE RESPECTED OWNERS AND NOT ME.. I AM NOT THE OWNER OF ANY PICTURE/IMAGE SHOWN IN THE VIDEO DISCLAIMER : THIS VIDEO IS FOR EDUCATIONAL PURPOSE ONLY. Please do not use this method for illegal or malicious activities because hacking is crime.if you do this then it's can land you in jail. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

OWASP Top 10 in Telugu | OWASP Top 10 Explained | VulnLogic Telugu | Vuln Logic Telugu

11936
365
18
00:12:58
12.04.2020

Today's Topic is "OWASP Top 10" in Telugu I have covered all the details of the OWASP Top 10 Categories in a very layman language where even a non technical person can understand the about OWASP & OWASP Top 10 Categories. All the categories are covered in simple terms with a simple example. #OWASPTop10 #OWASP #OWASPTOP10telugu

The OWASP Top Ten 2021 No. 3 Injection SQL Injection

187
1
0
00:04:42
30.11.2021

Watch Jim Manico as he speaks about "The OWASP Top Ten 2021 No. 3 Injection SQL Injection" at Open Security Summit CIC. Catch the full session here: 🤍 KEYWORD owasp top 10 2021 owasp top 10 with examples owasp top 10 list what does the owasp top 10 list name the classification for this vulnerability owasp top 10 vulnerabilities 2021 what is owasp OWASP Top 10 Release 2021

Whiteboard Wednesday: An Intro to the OWASP Top 10

22623
248
4
00:03:33
08.05.2019

Garrett Gross, Application Security Specialist, walks us through the history of the OWASP Top 10, discusses how the list was assembled, and introduces the most prevalent cyber attacks included in the list.. He also explains in depth how the top attacks occur and what you can do to secure against them.

API security with OWASP ZAP in GitLab pipelines

720
12
0
00:04:06
03.05.2022

Link to pipelines: 🤍 How to integrate pipelines: 🤍 Our contacts: 🤍 sales🤍whitespots.io

What is OWASP?

107
4
0
00:00:17
31.10.2022

Read More at: securitycipher.com/security-terminologies/ The Open Web Application Security Project (OWASP) is a nonprofit foundation dedicated to improving software security. It operates under an “open community” model, which means that anyone can participate in and contribute to OWASP-related online chats, projects, and more. For everything from online tools and videos to forums and events, the OWASP ensures that its offerings remain free and easily accessible through its website. #security #securitycipher #securitytool #owasp #securitylearn #pentesting #pentest #secure #productsecurity

Introducción a OWASP: ¿Qué es Open Web Application Security Project y por qué me debería unir?

1971
36
0
00:01:31
07.05.2021

Introducción a Open Web Application Security Project y beneficios de ser miembro. Links de interés: Página de OWASP: 🤍 Proyectos de OWASP: 🤍 Página de OWASP UY: 🤍 Página para hacerse miembro: 🤍 Meetup: 🤍 Github: 🤍

Top 10 Web App Security Vulnerabilities 2021 | OWASP Top 10 Web Application Security Risks 2021

6394
203
28
00:19:57
22.08.2021

1:1 Coaching & Resources: 🤍 Patreon (Cyber/tech-career resources) ♡: 🤍 Why you should learn to code: 🤍 Top 7 Coding Languages for Cyber Security: 🤍 My new team (Miami work vlog): 🤍 Watch next :) - How much does cyber security pay: 🤍 How to get your first cyber security job: 🤍 Why go into cyber security: 🤍 Why you shouldn’t go into cyber security: 🤍 Resume That Got Me My First Cyber Security Job: 🤍 How to get started in cyber security with no experience: 🤍 Top 7 Skills for Cyber Security: 🤍 Top 7 Cyber Security Conferences: 🤍 Security Analyst work vlog: 🤍 Cyber Security Interview Prep: 🤍 Top 7 Jobs in Cyber Security: 🤍 How I passed my Security+ certification exam: 🤍 The SWE vs Cyber series: Which should I choose - Cyber Security or Software Development?: 🤍 Cyber Security vs Software Engineer: 🤍 SWE Resume vs Cyber Security Resume: 🤍 —————————————————— Hey there :) - thanks for watching! I post videos every Wednesday and Sunday, please subscribe, like, and share if you enjoyed this video! It really supports me and if there are any videos you’d like to see from me, please feel free to drop it down in the comments below and I’ll try my best! ⇩♡ Support the channel ♡ : 🤍 1:1 Coaching: 🤍 ❈ Connect with me ❈ Vlog Channel: 🤍 Blog: 🤍 Twitch: 🤍 Advice for Ambition Podcast (Available on any podcast platform): 🤍 My handmade jewelry: 🤍 ❈ Filming Equipment ❈ Camera: 🤍 Vlogging Camera: 🤍 Phone Tripod: 🤍 Ring Light Tripod: 🤍 ❈ All my favorite products ❈ 🤍 Buy me a coffee: 🤍 My amazon wishlist: 🤍 ❈ Discounts/Codes ❈ Robinhood free stock: 🤍 Webull free stock: 🤍 Wealthfront $5,000 invested free 🤍 Yotta Savings (100 free tickets) 🤍 Lyft $5 credit: 🤍 Uber $6 credit: 🤍 Seated $15 reward: 🤍 Airbnb $20 credit: 🤍 Music: 🤍 Brand/collaboration inquiries: hello🤍withlovesandra.com Disclaimer: This video is not sponsored. Some links are affiliate links which means I earn a small commission if anyone decides to purchase through them. Thank you so much for your support! Timestamps: Intro (0:00) Reasons to know the OWASP Top 10 (0:18) Injection Attacks (1:09) Broken Authentication (2:37) Sensitive Data Exposure (4:05) XLM External Entities (XXE) (5:00) Broken Access Control (6:38) Security Misconfigurations (8:12) Cross-Site Scripting XSS (10:11) Insecure Deserialization (12:13) Using Components with Known Vulnerabilities (14:34) Insufficient Logging & Monitoring (16:45) Tags: top 10 web security vulnerabilities,top 10 security vulnerabilities,top 10 security vulnerabilities 2021,top 10 web security vulnerabilities 2021,top 10 web app security vulnerabilities 2021,top 10 web app security vulnerabilities,top 10 web application security vulnerabilities,top 10 web application security vulnerabilities 2021,owasp top 10 explained,owasp top 10 security vulnerabilities,owasp top 10 web application vulnerabilities,top 10 web security vulnerabilities 2021,owasp top 10 explained with examples

O Que é o OWASP TOP 10?

2724
271
15
00:13:00
23.08.2021

PYTHON PARA HACKERS Aprenda a Desenvolver Ferramentas de Segurança da Informação em Python Link do Curso ▶ 🤍 ▰▰▰ Curso de Segurança da Informação e Hacking ▶ 🤍 ▰▰▰ REDES PARA SEGURANÇA DA INFORMAÇÃO ▶ 🤍 ▰▰▰ 25 Ferramentas para PenTest ▶ 🤍 ▰▰▰ Abaixo nosso Instagram, Facebook, Discord, Telegram, Spotify e Promoções: Acesse ▶ 🤍 ▰▰▰ Sendo membro você tem acesso a vantagens especiais e ajuda nossa comunidade! SEJA MEMBRO ▶ 🤍 ▰▰▰ Nós postamos vídeos todas as segundas e quintas às 20h00! ▰▰▰ #GuiaAnônima #SegurançaDaInformação #PorAfonsoDaSilva ▰▰▰ Conheça Nossos Canais ▶ 🤍

An Introduction to the OWASP Top 10 (Web Application Security Risks)

7517
127
0
00:15:15
10.07.2021

In this video we'll be taking a look at OWASP and the OWASP Top 10, providing a basic introduction into what the OWASP Top 10 is and briefly exploring each of the Top 10 in more detail. Please see the links below if you'd like to learn more about OWASP and the OWASP Top 10: 🤍 🤍 Please get in touch if you'd like to learn more about how Predatech can help you secure your web application. Website: 🤍 Facebook: 🤍 Twitter: 🤍 Linkedin: 🤍

3 outils OWASP pour sécuriser son code

435
13
2
00:05:35
18.09.2019

☠️ Chez AppSec Academy, nous savons que les failles applicatives sont aujourd’hui les principales sources d’infections et de piratages. ☠️ ⏩ C’est pour cela que nous nous sommes donné la mission de vous guider pas à pas dans la sécurisation de vos « assets » applicatifs. Que vous soyez architecte logiciel, développeur, testeur ou bien responsable technique, nous vous aidons à compliquer la tâche aux pirates à travers cette série de vidéos. ⏩ Découvrez la première vidéo de cette série et n’hésitez pas à la partager avec vos connaissances travaillant dans le domaine du développement logiciel. Liens en rapport avec la vidéo : - OWASP : 🤍 - Code Review guide : 🤍 - OWASP ZAP : 🤍 - OWASP SKF : 🤍 - « Bookez » votre démo pour découvrir notre nouvelle plateforme de sécurité applicative : 🤍

[Hindi] What is owasp top 10? | What is owasp ? | Must for Ethical Hackers and Software Developers

6066
155
14
00:04:56
06.09.2020

Topics : What is owasp What is owasp top 10 How owasp top 10 list is created Why owasp is important to ethical hackers owasp zap owasp vulnerable web application #owasptop10 #owasptop10explained Namaskar Mitro, aaj ke iss video maine bat ki hai owasp (open web application security project) ke baare mai (what is owasp),aur owasp top 10 ke baare (What is owasp top 10?) wo kya hota hai, aur kyu important hai ethical hackers aur developers ke liye. Aur baat ki hai owasp top 10 kaise banta hai. Aur sath hi baat ki hai owasp ke dusre products ke baare mai jaise ki owasp zap aur owasp vulnerable web applications. Umeed hai ki appko yeh video pasand aaya hoga. Namaskar Mitro, Today in this video i have talked about What is owasp (open web application security project) and what is owasp top 10 and why it is important for ethical hackers and the software developers. And have also talked about how the owasp top 10 list is created. And have also shared inforamtion about other products of owasp such as owasp zap and owasp vulnerable web application. Hope you liked the video. Connect with Technical MotaBhai Facebook : 🤍 Twitter : 🤍 Instagram : 🤍 Mail me : technicalmotabhai🤍gmail.com Youtube : 🤍 🔊 LIKE ➡ SHARE ➡ SUBSCRIBE About : Technical MotaBhai is a YouTube Channel, where you will find technological videos in Hindi :) NOTE : All content used is copyright to TechnicalMotaBhai, Use or commercial display or editing of the content without proper authorization is not allowed.

Treinamento Starter - Aula 04 - O que é OWASP Top 10

1123
46
0
00:05:14
09.02.2021

AppSec Starter é um treinamento básico de conscientização em segurança de aplicações aplicado para onboarding de novos desenvolvedores. Não é o objetivo deste treinamento discutir tópicos avançados e práticos. A Conviso possuí treinamentos customizados e plataformas de capacitação prática consulte. Treinamento gravado por Nicolas Schmaltz e direitos autorais reservados a Conviso Application Security S/A. Conteúdo da Aula 4: Apresenta o que é Open Web Application Security Project (OWASP) e o projeto OWASP Top 10: - Injection - Broken Authentication and Session Management - Sensitive Data Exposure - XML External Entity (XXE) - Broken Access Control - Security Misconfiguration - Cross-Site Scripting(XSS) - Insecure Deserialization - Using Components with known Vulnerabilities

Назад
Что ищут прямо сейчас на
owasp kimchi fisherx Ducky Channel Bruberry saves бронетранспортёры ellhnikes Аркейдж WPvP sims 4 house build khl andrey kir accordion kemarincover kemari рд game mechanics explained kejadian aneh kazan Sliced plushies