BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage Presentations OWASP Top 10 Vulnerabilities & ASP.NET

OWASP Top 10 Vulnerabilities & ASP.NET

Bookmarks
59:33

Summary

Bill Dinger goes over the 2017 OWASP Top 10 vulnerabilities and how they apply to ASP.NET, including a demo of each vulnerability, the risk it poses, how to detect the attack, and how to mitigate it.

Bio

Bill Dinger is a Solutions Architect with VML working on delivering digital solutions to our clients. Over the last 15 years Bill has worked in enterprise IT starting in the trenches on the help desk. After that, Bill spent almost a decade working in infrastructure support focusing in the Microsoft stack. Over the last 5 years Bill has been developing, architecting and leading teams with VML.

About the conference

This year, we will kick off the conference with full day workshops (pre-compilers) where attendees will be able to get “hands-on” and exchange experiences with their peers in the industry.

Recorded at:

Mar 10, 2019

Hello stranger!

You need to Register an InfoQ account or or login to post comments. But there's so much more behind being registered.

Get the most out of the InfoQ experience.

Allowed html: a,b,br,blockquote,i,li,pre,u,ul,p

Community comments

  • Hashing is not a form of asymmetric encryption

    by Karl Mayer,

    Your message is awaiting moderation. Thank you for participating in the discussion.

    Responding to 16:00 into the video: hashing is a cryptographic function, but it's not an encryption function. Symmetric and asymmetric encryption are both two-way cryptographic functions. More on asymmetric (public-key) encryption: en.wikipedia.org/wiki/Public-key_cryptography

  • Re: Hashing is not a form of asymmetric encryption

    by Bill Dinger,

    Your message is awaiting moderation. Thank you for participating in the discussion.

    Yep, I misspoke there apologies. Hashing is something like PBk2df, Asymmetric is public key, and symmetric is more traditional form like DES

  • Repo for this samples?

    by Edgar Madrigal,

    Your message is awaiting moderation. Thank you for participating in the discussion.

    Do you have a repo for the code? The quality is not the best on the video...

Allowed html: a,b,br,blockquote,i,li,pre,u,ul,p

Allowed html: a,b,br,blockquote,i,li,pre,u,ul,p

BT