This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "User:Yuho Kameda"

From OWASP
Jump to: navigation, search
Line 42: Line 42:
 
  I talked about OWASP ZAP in charge of Web Application Vulnerable Assesment.
 
  I talked about OWASP ZAP in charge of Web Application Vulnerable Assesment.
 
* 2015/08/29 [http://minihardening.connpass.com/event/17909/ MINI Hardening #1.2]
 
* 2015/08/29 [http://minihardening.connpass.com/event/17909/ MINI Hardening #1.2]
** Japanese Contents : [https://speakerdeck.com/ykame/29 MINI Hardening #1.2 20分LT ZAPを使ったHardening対策術� 2015/8/29]
+
** Japanese Contents : [https://speakerdeck.com/ykame/29 MINI Hardening #1.2 20分LT ZAPを使ったHardening対策術 2015/8/29]
  
 
=== Training Session ===
 
=== Training Session ===
Line 68: Line 68:
 
* [http://ascii.jp/elem/000/000/928/928352/index-2.html DEF CON 22の頂上決戦!CTFでの日本チームを追う]
 
* [http://ascii.jp/elem/000/000/928/928352/index-2.html DEF CON 22の頂上決戦!CTFでの日本チームを追う]
 
* [http://www.atmarkit.co.jp/ait/articles/1507/14/news005.html 無慈悲な専門家チーム「kuromame6」の暗躍に負けず勝利をつかんだチームは? (1/2)]
 
* [http://www.atmarkit.co.jp/ait/articles/1507/14/news005.html 無慈悲な専門家チーム「kuromame6」の暗躍に負けず勝利をつかんだチームは? (1/2)]
 +
* [http://www.nisc.go.jp/security-site/month/columu/20150210.html#columu2 パソコンに詳しくなくても出来る!サイバー犯罪対策の第一歩]

Revision as of 12:29, 17 December 2015

Yuho Kameda(亀田 勇歩) aka ykame

I'm Yuho Kameda, I work as Security Engineer. I am active in OWASP Japan on a regular basis.

Please send any questions to me via following at.

Some of my work

OWASP ZAP Project

I have participated in the OWASP ZAP Project.

I became the ZAP Evangelist on March, 2014. I am engaged in activities that spread the ZAP in Japan.

Documentation

Presentation

I talked about Local Proxy War in charge of OWASP ZAP.
I talked about OWASP ZAP in charge of Web Application Vulnerable Assesment.

Training Session

Live Demonstration

OWASP ZAP + OWASP Broken Web Application

Vulnerability Assessment

Presentation


Article