Penetration test

Results: 1186



#Item
231SQL injection / MongoDB / BSON / NoSQL / SQL / Document-oriented database / Penetration test / JSON / Data management / Computing / Data

(in)Secure code, Exploits and mitigation AngularJS and MongoDB Israel Chorzevski Tech leader, AppSec Labs

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-09-09 03:51:21
232Security / Software testing / OWASP / Penetration test / Logic / SQL injection / Computer network security / Computer security / Cyberwarfare

The Art of Exploiting Logical Flaws in Web Apps Sumit “sid” Siddharth Richard “deanx” Dean A GREAT COLLABORATION!

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 13:14:23
233Payment systems / Video game content ratings systems / Recreational Software Advisory Council / Self-censorship / Penetration test / Point of sale / Computer security / Server / PIN pad / Business / Electronic commerce / Computer network security

SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-04-18 18:17:07
234Computer network security / Cyberwarfare / Security / Software quality / National security / Attack patterns / Software assurance / Vulnerability / Penetration test / Software testing / Computer security / Hacking

An Introduction to Attack Patterns as a Software Assurance Knowledge Resource OMG Software Assurance Workshop 2007

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:21
235Software testing / Security / Electronic commerce / National security / Penetration test / Vulnerability / Secure coding / Computer network security / Computer security / Cyberwarfare

WIREDRIVE CHECKMARX’S Case Study About the Company founded inThe Wiredrive team consists of 35 employees and has

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2015-02-26 02:03:44
236Software testing / Security / Hacking / Penetration test / Electronic commerce / Vulnerability / Attack / SAINT / Application security / Computer network security / Computer security / Cyberwarfare

Microsoft Worddoc

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:49:51
237Cyberwarfare / Computer network security / Hacking / Penetration test / Vulnerability / Social vulnerability / Campaign for Nuclear Disarmament / Exploit / Software testing / Computer security / Risk

Automated Vulnerability Assessment Service (AVAS)

Add to Reading List

Source URL: www.cndltd.com

Language: English - Date: 2015-04-06 08:53:22
238Smartphones / Computer security / Mobile Web / Penetration test / Mobile phone / IPhone / Application security / Mobile business intelligence / Mobile commerce / Technology / Electronics / Mobile technology

Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox

Add to Reading List

Source URL: mena.boozallen.com

Language: English - Date: 2015-04-24 06:20:09
239Computer network security / Software testing / Rapid7 / Metasploit Project / Penetration test / Bain Capital Ventures / Federal Information Security Management Act / Vulnerability / CVSS / Software / Computer security / System software

Company Overview History Rapid7 offers solutions for: Headquartered in Boston, MA, Rapid7 was founded inIn response to the

Add to Reading List

Source URL: information.rapid7.com

Language: English - Date: 2015-04-26 23:49:14
240Computer network security / Software testing / Metasploit Project / Rapid7 / Penetration test / Phishing / Attack / Hacker / Social engineering / Software / Computer security / Computing

Advanced Threat Tactics with Advanced Threat Tactics teaches a modern penetration testing process using Cobalt Strike and the Metasploit® Framework. Abstract This demonstration and lab-oriented class teaches IT professi

Add to Reading List

Source URL: www.advancedpentest.com

Language: English
UPDATE