Episode Artwork
1.0x
0% played 00:00 00:00
Dec 19 2019 13 mins   12
OWASP Portland 2019 Training Day Abstract: Over 3 billion browser devices are actively loading arbitrary data served by someone else. What happens if one of those pages contains maliciously crafted JavaScript? Could they capture your passwords, perform UXSS, or worse - execute local code on your machine? In this session, you will get the opportunity to explore the anatomy and play with common vulnerability patterns in the renderer process of Chrome. This will be an interactive class; please bring a laptop with Docker installed. Justin is interviewed by John L. Whiteman. Support the show