Artwork

Content provided by OWASP PDX. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by OWASP PDX or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Justin Angra - Intro to Chrome Exploitation

13:40
 
Share
 

Manage episode 273624857 series 2800126
Content provided by OWASP PDX. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by OWASP PDX or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

OWASP Portland 2019 Training Day

Abstract: Over 3 billion browser devices are actively loading arbitrary data served by someone else. What happens if one of those pages contains maliciously crafted JavaScript? Could they capture your passwords, perform UXSS, or worse - execute local code on your machine? In this session, you will get the opportunity to explore the anatomy and play with common vulnerability patterns in the renderer process of Chrome. This will be an interactive class; please bring a laptop with Docker installed.
Justin is interviewed by John L. Whiteman.
Support the show

  continue reading

47 episodes

Artwork
iconShare
 
Manage episode 273624857 series 2800126
Content provided by OWASP PDX. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by OWASP PDX or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

OWASP Portland 2019 Training Day

Abstract: Over 3 billion browser devices are actively loading arbitrary data served by someone else. What happens if one of those pages contains maliciously crafted JavaScript? Could they capture your passwords, perform UXSS, or worse - execute local code on your machine? In this session, you will get the opportunity to explore the anatomy and play with common vulnerability patterns in the renderer process of Chrome. This will be an interactive class; please bring a laptop with Docker installed.
Justin is interviewed by John L. Whiteman.
Support the show

  continue reading

47 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide