This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Malware Guide"
From OWASP
(→OWASP Malware Presentations) |
|||
Line 22: | Line 22: | ||
|NA | |NA | ||
|- | |- | ||
− | | | + | |[[File:Smith.pdf|thumb]]] |
− | [[File:Smith.pdf|thumb]]] | ||
|How Malware Attacks Web Applications by Casey Smith | |How Malware Attacks Web Applications by Casey Smith | ||
|Novice / Intermediate | |Novice / Intermediate |
Latest revision as of 01:59, 27 February 2018
OWASP Malware guide
OWASP Malware Guide is OWASP Project goals to educate about learning Malware
OWASP Malware Presentations
Title | Comment | Level | Date (2015-07-04) |
---|---|---|---|
File:XcodeGhost malware in ios 8.pptx |
XcodeGhost Malware | Intermediate | NA |
File:Identifikasi dan mitigasi sandworm pada jaringan (new).pptx | Sandworm Malware in the networking area | Novice / Intermediate | NA |
File:Smith.pdf] | How Malware Attacks Web Applications by Casey Smith | Novice / Intermediate | NA |
,