Section 01: Introduction |
|
Introduction and motivation |
|
00:02:00 |
|
Well-known Vulnerabilities Overview |
|
00:02:00 |
|
Causes & Background |
|
00:09:00 |
|
Secure Programming in general |
|
00:03:00 |
Section 02: Well-known Vulnerabilities and Secure Programming |
|
Code/Command Injection |
|
00:03:00 |
|
(No)SQL Code Injection |
|
00:04:00 |
|
Cross-Site Request Forgery (CSRF) |
|
00:05:00 |
|
Cross-Site Scripting (XSS) |
|
00:05:00 |
|
Open Redirection |
|
00:04:00 |
|
File Inclusion / Directory Traversal |
|
00:05:00 |
|
Clickjacking |
|
00:04:00 |
|
Session-Hijacking |
|
00:07:00 |
|
Information Disclosure |
|
00:03:00 |
|
Authentification |
|
00:07:00 |
|
Denial of Service |
|
00:05:00 |
|
Middleware |
|
00:01:00 |
|
Third-Party Software |
|
00:01:00 |
Section 03: Conclusion and Summary |
|
Conclusion and Summary |
|
00:04:00 |