This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Malware Guide"
From OWASP
| (5 intermediate revisions by the same user not shown) | |||
| Line 2: | Line 2: | ||
OWASP Malware Guide is OWASP Project goals to educate about learning Malware | OWASP Malware Guide is OWASP Project goals to educate about learning Malware | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
== OWASP Malware Presentations == | == OWASP Malware Presentations == | ||
| Line 16: | Line 11: | ||
! width="15%" |Date (2015-07-04) | ! width="15%" |Date (2015-07-04) | ||
|- | |- | ||
| − | |[[File:XcodeGhost malware in ios 8.pptx|thumb|left]] | + | |[[File:XcodeGhost malware in ios 8.pptx|thumb|left]] <br> |
| + | [[File:XcodeGhost malware in ios 8.pdf |thumb|left]]<br> | ||
|XcodeGhost Malware | |XcodeGhost Malware | ||
|Intermediate | |Intermediate | ||
| − | | | + | |NA |
|- | |- | ||
| − | |[ | + | |[[File:Identifikasi_dan_mitigasi_sandworm_pada_jaringan_(new).pptx]] |
| − | | | + | |Sandworm Malware in the networking area |
|Novice / Intermediate | |Novice / Intermediate | ||
| − | | | + | |NA |
|- | |- | ||
| − | |[ | + | |[[File:Smith.pdf|thumb]]] |
| − | | | + | |How Malware Attacks Web Applications by Casey Smith |
|Novice / Intermediate | |Novice / Intermediate | ||
| − | | | + | |NA |
|} | |} | ||
, | , | ||
<br> | <br> | ||
Latest revision as of 01:59, 27 February 2018
OWASP Malware guide
OWASP Malware Guide is OWASP Project goals to educate about learning Malware
OWASP Malware Presentations
| Title | Comment | Level | Date (2015-07-04) |
|---|---|---|---|
| File:XcodeGhost malware in ios 8.pptx |
XcodeGhost Malware | Intermediate | NA |
| File:Identifikasi dan mitigasi sandworm pada jaringan (new).pptx | Sandworm Malware in the networking area | Novice / Intermediate | NA |
| File:Smith.pdf] | How Malware Attacks Web Applications by Casey Smith | Novice / Intermediate | NA |
,