SlideShare uma empresa Scribd logo
1 de 63
Baixar para ler offline
Did you know?
Hacks Happen

Jeremiah Grossman
Founder  CTO WhiteHat Security




                                  1
First Book I Read on Website Security




                  “It is insufficient to protect ourselves
                  with laws; we need to protect ourselves
                  with mathematics. It's just not true.

                  Cryptography can't do any of that.”   :(
                                                             2
Did you know?




                3
By the End of 2008...



        17 million
      programmers
       worldwide
Writing 6,000 lines of code per year (each)



                                              4
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008
Hack In The Box (Dubai) 04172008

Mais conteúdo relacionado

Destaque

PLoS Author Research 2010
PLoS Author Research 2010PLoS Author Research 2010
PLoS Author Research 2010Liz Allen
 
Improve your Google search skills
Improve your Google search skillsImprove your Google search skills
Improve your Google search skillssultanarun
 
Presentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture AssociationPresentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture Associationguest43929b
 
Susie Almaneih: Greening Your House
Susie Almaneih: Greening Your HouseSusie Almaneih: Greening Your House
Susie Almaneih: Greening Your HouseSusie Almaneih
 
La Boîte à Rêves
La Boîte à RêvesLa Boîte à Rêves
La Boîte à RêvesCapgemini
 
Utilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA TrainingUtilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA TrainingPaul Brown
 
EHRを活用した糖尿病療養指導の質的研究
EHRを活用した糖尿病療養指導の質的研究EHRを活用した糖尿病療養指導の質的研究
EHRを活用した糖尿病療養指導の質的研究Satoshi Taniguchi
 
Web Development Company PPT Presentation - Vidushi Infotech
Web Development Company PPT Presentation - Vidushi InfotechWeb Development Company PPT Presentation - Vidushi Infotech
Web Development Company PPT Presentation - Vidushi InfotechVidushi Infotech SSP Pvt Ltd
 
Renewable Energy - An Introduction to Everything you Need to Know
Renewable Energy - An Introduction to Everything you Need to KnowRenewable Energy - An Introduction to Everything you Need to Know
Renewable Energy - An Introduction to Everything you Need to KnowCastlewellan
 
Where Ideas (and creative genius) come from: HOW TO pt1 take it from Idea to...
Where Ideas (and creative genius) come from:  HOW TO pt1 take it from Idea to...Where Ideas (and creative genius) come from:  HOW TO pt1 take it from Idea to...
Where Ideas (and creative genius) come from: HOW TO pt1 take it from Idea to...Chelsea Dygert
 
The United Methodist Church 2016 Campaign
The United Methodist Church 2016 CampaignThe United Methodist Church 2016 Campaign
The United Methodist Church 2016 CampaignSnow Jingxue Wang
 

Destaque (13)

PLoS Author Research 2010
PLoS Author Research 2010PLoS Author Research 2010
PLoS Author Research 2010
 
Improve your Google search skills
Improve your Google search skillsImprove your Google search skills
Improve your Google search skills
 
Presentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture AssociationPresentation For Chinese Medicine And Acupuncture Association
Presentation For Chinese Medicine And Acupuncture Association
 
Susie Almaneih: Greening Your House
Susie Almaneih: Greening Your HouseSusie Almaneih: Greening Your House
Susie Almaneih: Greening Your House
 
La Boîte à Rêves
La Boîte à RêvesLa Boîte à Rêves
La Boîte à Rêves
 
Utilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA TrainingUtilizing Web 2.0 and the Cloud in RA Training
Utilizing Web 2.0 and the Cloud in RA Training
 
SERA Email 2.6.03
SERA Email 2.6.03SERA Email 2.6.03
SERA Email 2.6.03
 
EHRを活用した糖尿病療養指導の質的研究
EHRを活用した糖尿病療養指導の質的研究EHRを活用した糖尿病療養指導の質的研究
EHRを活用した糖尿病療養指導の質的研究
 
Web Development Company PPT Presentation - Vidushi Infotech
Web Development Company PPT Presentation - Vidushi InfotechWeb Development Company PPT Presentation - Vidushi Infotech
Web Development Company PPT Presentation - Vidushi Infotech
 
Managerial speeches
Managerial speechesManagerial speeches
Managerial speeches
 
Renewable Energy - An Introduction to Everything you Need to Know
Renewable Energy - An Introduction to Everything you Need to KnowRenewable Energy - An Introduction to Everything you Need to Know
Renewable Energy - An Introduction to Everything you Need to Know
 
Where Ideas (and creative genius) come from: HOW TO pt1 take it from Idea to...
Where Ideas (and creative genius) come from:  HOW TO pt1 take it from Idea to...Where Ideas (and creative genius) come from:  HOW TO pt1 take it from Idea to...
Where Ideas (and creative genius) come from: HOW TO pt1 take it from Idea to...
 
The United Methodist Church 2016 Campaign
The United Methodist Church 2016 CampaignThe United Methodist Church 2016 Campaign
The United Methodist Church 2016 Campaign
 

Semelhante a Hack In The Box (Dubai) 04172008

Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Jeremiah Grossman
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Jay Beale
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?Global Knowledge Training
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
Quotables Quotes
Quotables QuotesQuotables Quotes
Quotables Quotesmat f.
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 

Semelhante a Hack In The Box (Dubai) 04172008 (20)

Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
Malwares
MalwaresMalwares
Malwares
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
CYBER
CYBERCYBER
CYBER
 
News Bytes
News BytesNews Bytes
News Bytes
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Quotables Quotes
Quotables QuotesQuotables Quotes
Quotables Quotes
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 

Último

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Último (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

Hack In The Box (Dubai) 04172008

  • 1. Did you know? Hacks Happen Jeremiah Grossman Founder CTO WhiteHat Security 1
  • 2. First Book I Read on Website Security “It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics. It's just not true. Cryptography can't do any of that.” :( 2
  • 4. By the End of 2008... 17 million programmers worldwide Writing 6,000 lines of code per year (each) 4