We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Red Team Village - Red Teaming: Born from the Hacker Community

00:00

Formal Metadata

Title
Red Team Village - Red Teaming: Born from the Hacker Community
Title of Series
Number of Parts
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Chris Wysopal is currently Veracode's CTO and Co-Founder. He is responsible for the company's software security analysis capabilities. One of the original vulnerability researchers and a member of L0pht Heavy Industries, Chris has testified on Capitol Hill in the US on the subjects of government computer security and how vulnerabilities are discovered in software. He published his first advisory in 1996 on parameter tampering in Lotus Domino and has been trying to help people not repeat this type of mistake for 15 years. Back in 1997 he first got paid for hacking someone else's network and later a company's web application. Chris was hooked and has been performing security testing one way or another since.
Asynchronous Transfer ModeHacker (term)Presentation of a groupSlide ruleTouchscreenSoftware testingShared memoryRight angleMeeting/Interview
Asynchronous Transfer ModeHacker (term)Information securityClient (computing)ComputerInternet service providerComputer-generated imageryComputerInformationComputer networkCompilation albumGame theoryHacker (term)Natural numberInformation technology consultingInformation securityComputational intelligenceBulletin board systemClient (computing)QuicksortSpywareFlow separationPhysical systemVector potentialBridging (networking)Vulnerability (computing)Computer hardwareOrder (biology)Machine codeDeterminismMereologyEndliche ModelltheorieInformationIn-System-ProgrammierungElectronic mailing listVirtual machineArtificial neural networkInternetworkingProcess (computing)Computer wormReverse engineeringDifferent (Kate Ryan album)Group actionRight angleMedical imagingSoftwareSlide ruleEmailMultiplication signBasis <Mathematik>EncryptionAuthenticationAuthorizationEvent horizonProjective planeComputer networkBit
Event horizonWebsiteInformation securityAsynchronous Transfer ModeHacker (term)PasswordArtificial neural networkInformationDemo (music)Forcing (mathematics)Software bugSpectrum (functional analysis)Hacker (term)FlagComputer fileMathematicsPasswordWireless LANTrailForm (programming)Parameter (computer programming)Information technology consultingSoftwareQuicksortSoftware testingComputer networkInformation securityVulnerability (computing)EmailBitSource codeRight angleElectronic mailing listAntivirus softwareMultiplication signArtificial neural networkAuthorizationConnected spaceLocal ringProcess (computing)WebsiteSocial engineering (security)MalwareComputational intelligenceExecution unitPhysical systemAreaPort scannerGroup actionPresentation of a groupPhysical lawDifferent (Kate Ryan album)WindowInternetworkingBasis <Mathematik>Text editorInformationExploit (computer security)System administratorLimit (category theory)PhysicalismIntelWave packetNatural numberReal numberMotion captureSilicon Graphics Inc.
Information technology consultingDemo (music)Asynchronous Transfer ModeLevel (video gaming)Maxima and minimaTuring testSquare numberPower (physics)Hacker (term)ComputerInternetworkingPower (physics)WebsiteBackupQuicksortConfiguration spaceWeb 2.0MereologyCovering spaceSocial engineering (security)Different (Kate Ryan album)PasswordCombinational logicBitRootSoftware testingComputer filePhysical systemExtension (kinesiology)Server (computing)PlanningSoftwareComputer networkInformation securityOrder (biology)Binary fileElectric fieldHacker (term)Execution unitProcess (computing)MathematicsVulnerability (computing)Service (economics)InformationMultiplication signValue-added networkLine (geometry)TwitterMachine codeInjektivitätDirection (geometry)Black boxPresentation of a groupDialectCuboidComputer-generated imageryRight anglePlastikkarteFreewareInformation technology consultingIntranetMobile WebEmailInternetworkingDatabaseLattice (order)Computer animation
Asynchronous Transfer ModeMeeting/Interview
Transcript: Englisch(auto-generated)