This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Malware Guide"
From OWASP
(→OWASP Malware Presentations) |
|||
Line 22: | Line 22: | ||
|NA | |NA | ||
|- | |- | ||
− | |[] | + | |[ |
− | | | + | [[File:Smith.pdf|thumb]]] |
+ | |How Malware Attacks Web Applications by Casey Smith | ||
|Novice / Intermediate | |Novice / Intermediate | ||
− | | | + | |NA |
|} | |} | ||
, | , | ||
<br> | <br> |
Revision as of 01:55, 27 February 2018
OWASP Malware guide
OWASP Malware Guide is OWASP Project goals to educate about learning Malware
OWASP Malware Presentations
Title | Comment | Level | Date (2015-07-04) |
---|---|---|---|
File:XcodeGhost malware in ios 8.pptx |
XcodeGhost Malware | Intermediate | NA |
File:Identifikasi dan mitigasi sandworm pada jaringan (new).pptx | Sandworm Malware in the networking area | Novice / Intermediate | NA |
[ | How Malware Attacks Web Applications by Casey Smith | Novice / Intermediate | NA |
,