This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Malware Guide"
From OWASP
(Created page with "OWASP Malware guide") |
|||
| (9 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
OWASP Malware guide | OWASP Malware guide | ||
| + | |||
| + | OWASP Malware Guide is OWASP Project goals to educate about learning Malware | ||
| + | |||
| + | == OWASP Malware Presentations == | ||
| + | {| class="wikitable sortable" style="text-align: top;" border="1" cellpadding="2" | ||
| + | |+ OWASP Malware Presentations | ||
| + | ! width="30%" |Title | ||
| + | ! width="40%" |Comment | ||
| + | ! width="15%" |Level | ||
| + | ! width="15%" |Date (2015-07-04) | ||
| + | |- | ||
| + | |[[File:XcodeGhost malware in ios 8.pptx|thumb|left]] <br> | ||
| + | [[File:XcodeGhost malware in ios 8.pdf |thumb|left]]<br> | ||
| + | |XcodeGhost Malware | ||
| + | |Intermediate | ||
| + | |NA | ||
| + | |- | ||
| + | |[[File:Identifikasi_dan_mitigasi_sandworm_pada_jaringan_(new).pptx]] | ||
| + | |Sandworm Malware in the networking area | ||
| + | |Novice / Intermediate | ||
| + | |NA | ||
| + | |- | ||
| + | |[[File:Smith.pdf|thumb]]] | ||
| + | |How Malware Attacks Web Applications by Casey Smith | ||
| + | |Novice / Intermediate | ||
| + | |NA | ||
| + | |||
| + | |} | ||
| + | , | ||
| + | <br> | ||
Latest revision as of 01:59, 27 February 2018
OWASP Malware guide
OWASP Malware Guide is OWASP Project goals to educate about learning Malware
OWASP Malware Presentations
| Title | Comment | Level | Date (2015-07-04) |
|---|---|---|---|
| File:XcodeGhost malware in ios 8.pptx |
XcodeGhost Malware | Intermediate | NA |
| File:Identifikasi dan mitigasi sandworm pada jaringan (new).pptx | Sandworm Malware in the networking area | Novice / Intermediate | NA |
| File:Smith.pdf] | How Malware Attacks Web Applications by Casey Smith | Novice / Intermediate | NA |
,