ºÝºÝߣshows by User: blaufish / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: blaufish / Tue, 07 Oct 2014 13:07:55 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: blaufish Att göra en podcast - branding, attityder osv [Säkerhetspodcasten] /slideshow/podcast-at-opkoko/39983560 podcastatopkoko-141007130755-conversion-gate01
Varför gör man en podcast? Hur gör man en podcast? Hur får man lyssnarna att känna igen sig och bli trogna ambassadörer? Massa tips från bland annat youtube creators guide och reelseo.]]>

Varför gör man en podcast? Hur gör man en podcast? Hur får man lyssnarna att känna igen sig och bli trogna ambassadörer? Massa tips från bland annat youtube creators guide och reelseo.]]>
Tue, 07 Oct 2014 13:07:55 GMT /slideshow/podcast-at-opkoko/39983560 blaufish@slideshare.net(blaufish) Att göra en podcast - branding, attityder osv [Säkerhetspodcasten] blaufish Varför gör man en podcast? Hur gör man en podcast? Hur får man lyssnarna att känna igen sig och bli trogna ambassadörer? Massa tips från bland annat youtube creators guide och reelseo. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/podcastatopkoko-141007130755-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Varför gör man en podcast? Hur gör man en podcast? Hur får man lyssnarna att känna igen sig och bli trogna ambassadörer? Massa tips från bland annat youtube creators guide och reelseo.
Att gæ—¦ra en podcast - branding, attityder osv [Sè¾°kerhetspodcasten] from blaufish
]]>
373 2 https://cdn.slidesharecdn.com/ss_thumbnails/podcastatopkoko-141007130755-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
History of some Vulnerabilities and exploit techniques /slideshow/history-of-some-vulnerabilities-and-exploit-techniques/27123528 exploittimelines-131012040949-phpapp01
Presentation on computer vulnerabilities and exploitation of them from 1970ies - 2013. Based on materials from from Early Computer Security Papers: Ongoing Collection (seclab.cs.ucdavis.edu), securitydigest.org, seclists.org, phrack, Morris Worm analysis's and various other preserved historical insights. In particular it covers Buffer Overflows, Injection attacks, XSS Cross Site Scripting. Note from audience member during presso was that injection vulns were known you had to protect from when member was coding in the 70'ies. Which fits my take aways: info security are horrible at remembering what it knew 20 years ago.]]>

Presentation on computer vulnerabilities and exploitation of them from 1970ies - 2013. Based on materials from from Early Computer Security Papers: Ongoing Collection (seclab.cs.ucdavis.edu), securitydigest.org, seclists.org, phrack, Morris Worm analysis's and various other preserved historical insights. In particular it covers Buffer Overflows, Injection attacks, XSS Cross Site Scripting. Note from audience member during presso was that injection vulns were known you had to protect from when member was coding in the 70'ies. Which fits my take aways: info security are horrible at remembering what it knew 20 years ago.]]>
Sat, 12 Oct 2013 04:09:49 GMT /slideshow/history-of-some-vulnerabilities-and-exploit-techniques/27123528 blaufish@slideshare.net(blaufish) History of some Vulnerabilities and exploit techniques blaufish Presentation on computer vulnerabilities and exploitation of them from 1970ies - 2013. Based on materials from from Early Computer Security Papers: Ongoing Collection (seclab.cs.ucdavis.edu), securitydigest.org, seclists.org, phrack, Morris Worm analysis's and various other preserved historical insights. In particular it covers Buffer Overflows, Injection attacks, XSS Cross Site Scripting. Note from audience member during presso was that injection vulns were known you had to protect from when member was coding in the 70'ies. Which fits my take aways: info security are horrible at remembering what it knew 20 years ago. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/exploittimelines-131012040949-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation on computer vulnerabilities and exploitation of them from 1970ies - 2013. Based on materials from from Early Computer Security Papers: Ongoing Collection (seclab.cs.ucdavis.edu), securitydigest.org, seclists.org, phrack, Morris Worm analysis&#39;s and various other preserved historical insights. In particular it covers Buffer Overflows, Injection attacks, XSS Cross Site Scripting. Note from audience member during presso was that injection vulns were known you had to protect from when member was coding in the 70&#39;ies. Which fits my take aways: info security are horrible at remembering what it knew 20 years ago.
History of some Vulnerabilities and exploit techniques from blaufish
]]>
414 2 https://cdn.slidesharecdn.com/ss_thumbnails/exploittimelines-131012040949-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Padding oracle [opkoko2011] /slideshow/padding-oracle-opkoko2011/24982867 paddingoraclepublic-130806071305-phpapp01
Padding Oracle attacks based on Thai Doug and Julianor Rizzor's work. Presented at Opkoko2011.]]>

Padding Oracle attacks based on Thai Doug and Julianor Rizzor's work. Presented at Opkoko2011.]]>
Tue, 06 Aug 2013 07:13:04 GMT /slideshow/padding-oracle-opkoko2011/24982867 blaufish@slideshare.net(blaufish) Padding oracle [opkoko2011] blaufish Padding Oracle attacks based on Thai Doug and Julianor Rizzor's work. Presented at Opkoko2011. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/paddingoraclepublic-130806071305-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Padding Oracle attacks based on Thai Doug and Julianor Rizzor&#39;s work. Presented at Opkoko2011.
Padding oracle [opkoko2011] from blaufish
]]>
368 2 https://cdn.slidesharecdn.com/ss_thumbnails/paddingoraclepublic-130806071305-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
License protections & software cracking /slideshow/license-protections-software-cracking/24937902 licenseprotectionssoftwarecracking-130805081537-phpapp02
How software license enforcement works, how they are cracked, and how cracking can be made harder. And how to make it very hard to create keymakers. Originally presented at Opkoko 2012. Also presented at HEAVENS project 2013.]]>

How software license enforcement works, how they are cracked, and how cracking can be made harder. And how to make it very hard to create keymakers. Originally presented at Opkoko 2012. Also presented at HEAVENS project 2013.]]>
Mon, 05 Aug 2013 08:15:37 GMT /slideshow/license-protections-software-cracking/24937902 blaufish@slideshare.net(blaufish) License protections & software cracking blaufish How software license enforcement works, how they are cracked, and how cracking can be made harder. And how to make it very hard to create keymakers. Originally presented at Opkoko 2012. Also presented at HEAVENS project 2013. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/licenseprotectionssoftwarecracking-130805081537-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How software license enforcement works, how they are cracked, and how cracking can be made harder. And how to make it very hard to create keymakers. Originally presented at Opkoko 2012. Also presented at HEAVENS project 2013.
License protections & software cracking from blaufish
]]>
598 2 https://cdn.slidesharecdn.com/ss_thumbnails/licenseprotectionssoftwarecracking-130805081537-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Anti pattern /slideshow/the-anti-pattern/24937535 antipattern-130805080334-phpapp01
Most common application security vulnerabilities are more or less variants on the same thing - "the anti pattern". The anti pattern is typically: 1 - an externally supplied input, and 2 - a powerful API operating directly on input supplied by previously mentioned input. The big point of the presso was to highlight why Criteria API (and Parameterized Queries if Criteria style APIs are not available) are to be used. Presented at Opkoko 2012.]]>

Most common application security vulnerabilities are more or less variants on the same thing - "the anti pattern". The anti pattern is typically: 1 - an externally supplied input, and 2 - a powerful API operating directly on input supplied by previously mentioned input. The big point of the presso was to highlight why Criteria API (and Parameterized Queries if Criteria style APIs are not available) are to be used. Presented at Opkoko 2012.]]>
Mon, 05 Aug 2013 08:03:34 GMT /slideshow/the-anti-pattern/24937535 blaufish@slideshare.net(blaufish) The Anti pattern blaufish Most common application security vulnerabilities are more or less variants on the same thing - "the anti pattern". The anti pattern is typically: 1 - an externally supplied input, and 2 - a powerful API operating directly on input supplied by previously mentioned input. The big point of the presso was to highlight why Criteria API (and Parameterized Queries if Criteria style APIs are not available) are to be used. Presented at Opkoko 2012. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/antipattern-130805080334-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Most common application security vulnerabilities are more or less variants on the same thing - &quot;the anti pattern&quot;. The anti pattern is typically: 1 - an externally supplied input, and 2 - a powerful API operating directly on input supplied by previously mentioned input. The big point of the presso was to highlight why Criteria API (and Parameterized Queries if Criteria style APIs are not available) are to be used. Presented at Opkoko 2012.
The Anti pattern from blaufish
]]>
456 2 https://cdn.slidesharecdn.com/ss_thumbnails/antipattern-130805080334-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Vulnerabilities and Exploitation - Application Security Sci-Fi Hipster Edition /slideshow/application-security-death-star/24936907 applicationsecuritydeathstar-130805074512-phpapp02
Explaining vulnerabilities, exploits, attack vectors, attack surface reduction, aslr etc to someone who understands The Imperial Deathstar. Presented at Opkoko 2013.1. Live presentation recording in Swedish here: http://www.youtube.com/watch?v=Xi9SRFENiO4 ]]>

Explaining vulnerabilities, exploits, attack vectors, attack surface reduction, aslr etc to someone who understands The Imperial Deathstar. Presented at Opkoko 2013.1. Live presentation recording in Swedish here: http://www.youtube.com/watch?v=Xi9SRFENiO4 ]]>
Mon, 05 Aug 2013 07:45:12 GMT /slideshow/application-security-death-star/24936907 blaufish@slideshare.net(blaufish) Vulnerabilities and Exploitation - Application Security Sci-Fi Hipster Edition blaufish Explaining vulnerabilities, exploits, attack vectors, attack surface reduction, aslr etc to someone who understands The Imperial Deathstar. Presented at Opkoko 2013.1. Live presentation recording in Swedish here: http://www.youtube.com/watch?v=Xi9SRFENiO4 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/applicationsecuritydeathstar-130805074512-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Explaining vulnerabilities, exploits, attack vectors, attack surface reduction, aslr etc to someone who understands The Imperial Deathstar. Presented at Opkoko 2013.1. Live presentation recording in Swedish here: http://www.youtube.com/watch?v=Xi9SRFENiO4
Vulnerabilities and Exploitation - Application Security Sci-Fi Hipster Edition from blaufish
]]>
494 2 https://cdn.slidesharecdn.com/ss_thumbnails/applicationsecuritydeathstar-130805074512-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Serial Killers - or Deserialization for fun and profit /slideshow/serialization-24936498/24936498 serialization-130805073354-phpapp02
Overview of different published de-serialization flaws in multiple different frameworks; Java, RMI, Struts, Spring, Ruby, PHP etc. Presented at Opkoko 2013.1.]]>

Overview of different published de-serialization flaws in multiple different frameworks; Java, RMI, Struts, Spring, Ruby, PHP etc. Presented at Opkoko 2013.1.]]>
Mon, 05 Aug 2013 07:33:54 GMT /slideshow/serialization-24936498/24936498 blaufish@slideshare.net(blaufish) Serial Killers - or Deserialization for fun and profit blaufish Overview of different published de-serialization flaws in multiple different frameworks; Java, RMI, Struts, Spring, Ruby, PHP etc. Presented at Opkoko 2013.1. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/serialization-130805073354-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Overview of different published de-serialization flaws in multiple different frameworks; Java, RMI, Struts, Spring, Ruby, PHP etc. Presented at Opkoko 2013.1.
Serial Killers - or Deserialization for fun and profit from blaufish
]]>
594 3 https://cdn.slidesharecdn.com/ss_thumbnails/serialization-130805073354-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/podcastatopkoko-141007130755-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/podcast-at-opkoko/39983560 Att göra en podcast - ... https://cdn.slidesharecdn.com/ss_thumbnails/exploittimelines-131012040949-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/history-of-some-vulnerabilities-and-exploit-techniques/27123528 History of some Vulner... https://cdn.slidesharecdn.com/ss_thumbnails/paddingoraclepublic-130806071305-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/padding-oracle-opkoko2011/24982867 Padding oracle [opkoko...