We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Making Hacking Child’s Play

00:00

Formal Metadata

Title
Making Hacking Child’s Play
Title of Series
Number of Parts
163
Author
License
CC Attribution - NonCommercial - ShareAlike 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
How does it keep happening? I mean why are websites so consistently hacked? Is it the work of sophisticated cyber-villains operating from underground lairs? As it turns out, many of today’s online attacks are mounted by kids – legally children – who simply have time, patience and access to Google. In this session we’re going to look at and execute a heap of online attacks with tools that even kids can use. You’ll learn just how easy it is to mount these attacks and most importantly, what it is you need to do to keep your apps secure not just from mischievous kids, but from cyber-criminals and even nation state actors. This talk is scary, entertaining and will make you distrusting of any kid with a PC.
LaceWater vaporProcess (computing)Thomas BayesNetwork topologyCartesian coordinate systemMoment (mathematics)InternetworkingStudent's t-testStrategy gameInformation securityWave packetBitHydraulic jumpShape (magazine)AreaQuicksortFreewareInformationOptical disc driveSign (mathematics)Machine visionSpacetimeLink (knot theory)Endliche ModelltheorieLevel (video gaming)1 (number)Basis <Mathematik>ChainArchaeological field surveyMultiplication signNumberHacker (term)DataflowMessage passingGateway (telecommunications)Hecke operatorTwitterDemo (music)System callPrime idealWeb browserComputer animationEngineering drawing
Search engine (computing)GoogolComputer-generated imageryGame theoryVideoconferencingPermianEuler anglesAddressing modeSystem callInformationCybersexTerm (mathematics)Latent heatType theoryElectronic mailing listPasswordEmailSpreadsheetUniform resource locatorGoodness of fitContext awarenessHacker (term)Hecke operatorCybersexGoogolInternetworkingPhysical systemInformationComputer animation
GoogolHacker (term)DatabaseInformationSpacetimePasswordAbelian categoryData managementExpert systemGame theoryComputer-generated imageryVideoconferencingMenu (computing)Execution unitReal numberInternetworkingPhysical systemControl flowComputer fileWebsiteExploit (computer security)Category of beingNumberExtension (kinesiology)QuicksortTerm (mathematics)Web 2.0DatabasePasswordInformationLink (knot theory)Arithmetic meanComputer animation
SynchronizationConvex hullComputer wormHookingSign (mathematics)Lemma (mathematics)SimulationSet (mathematics)FreewareMenu (computing)Mass flow rateInformationInformationVirtual machineMetropolitan area networkPiType theoryVulnerability (computing)Service (economics)WebsiteBridging (networking)BitIncidence algebraNetwork topologyMessage passingQuicksortView (database)Physical systemNeuroinformatikGastropod shellComputer fileFunctional (mathematics)Exploit (computer security)Information securitySpecial unitary groupWeightWeb 2.0Insertion lossComa BerenicesGame controllerRemote administrationMereologyWebcamCASE <Informatik>Computer configurationPasswordMalwareRight angleAddress spaceSystem callOrder (biology)Trojanisches Pferd <Informatik>Ferry CorstenReal numberKey (cryptography)Remote procedure callSlide ruleCombinational logicPermutationSoftware bugRow (database)Lattice (order)CD-ROMWeb pageComputer clusterWindowOperating systemPlanningDistribution (mathematics)Uniform resource locatorDigital photographyDifferent (Kate Ryan album)
Game theoryComputer-generated imageryVideoconferencingComputer iconProgrammable read-only memoryMultiplication signEmailWebsiteWordParameter (computer programming)BitCountingComputer animationProgram flowchart
Sign (mathematics)GradientRing (mathematics)PasswordMaxima and minimaMalwareEmailFormal verificationComa BerenicesUniversal product codeComa BerenicesImage registrationEmailAddress spaceForcing (mathematics)Physical systemSign (mathematics)Service (economics)WebsiteCASE <Informatik>PasswordCAPTCHADressing (medical)CountingExistenceTouchscreenQuicksortPiDifferent (Kate Ryan album)Physical lawDependent and independent variablesDemo (music)Dot productInformation privacyEnumerated typeOrder (biology)Web pageDomain nameFormal verificationBit1 (number)XMLProgram flowchart
PasswordLink (knot theory)Web pageCodeEmailAnalogyMessage passingTwin primePasswordCodeWebsiteScripting languageWeb 2.0Cross-site scriptingWeb pageStatisticsEmailXML
Inheritance (object-oriented programming)View (database)Hacker (term)Computer iconTerm (mathematics)Function (mathematics)Medical imagingDifferent (Kate Ryan album)Context awarenessTouchscreenoutputDemo (music)Greatest elementSource codeWeb pageUniform resource locatorWeb browserStructural loadHTTP cookieVulnerability (computing)Arithmetic meanPoint (geometry)Process (computing)Dependent and independent variablesPiSingle-precision floating-point formatScripting languageInjektivitätComputer animation
Structural loadVideo game consoleHacker (term)Curve fittingData typeHTTP cookieEmailCache (computing)Normed vector spaceFunction (mathematics)No free lunch in search and optimizationRouter (computing)SynchronizationComa BerenicesBitHTTP cookieDrill commandsConnected spaceCommunications protocolMultiplication signAuthorizationSource codeWebsiteDependent and independent variablesWeb pageMedical imagingMoment (mathematics)Line (geometry)TrailoutputStatement (computer science)Right angleScripting languageCovering spaceJava appletGreatest elementComputer animationXML
Grand Unified TheoryAiry functionHacker (term)Function (mathematics)Scripting languageDean numberClique-widthLoop (music)WebsiteSoftware developerVideo game consoleWeb pageReal numberInformation securityOrder (biology)Web browserElectronic visual displayRight angleVirtual machineTwitterScripting languageXMLComputer animation
Surjective functionMathematicsChi-squared distributionContent (media)Computer networkElement (mathematics)Function (mathematics)Loop (music)Default (computer science)LengthBoss CorporationServer (computing)Error messageWebsiteAreaDigital rights managementHypermediaWeb browserSign (mathematics)Client (computing)Direction (geometry)Shape (magazine)Line (geometry)Uniform resource locatorXML
Translation memoryProgrammable read-only memoryComputer wormMenu (computing)Web pageVideo game consoleDependent and independent variablesEmailHTTP cookieAsynchronous Transfer ModeCache (computing)Principle of maximum entropyWeb browserEmailMedical imagingWeb pageClient (computing)Dependent and independent variablesDigital rights managementScripting languageBitElectronic mailing listSpacetimeOnline helpVector spaceContent (media)Moment (mathematics)WebsiteCASE <Informatik>Cross-site scriptingService (economics)NumberHydraulic jumpBlogSource codeXML
Communications protocolFunction (mathematics)Loop (music)Web browserService (economics)Hydraulic jumpWeb browserFunctional (mathematics)Video game consoleWebsiteSource codeScripting languageServer (computing)Traffic reportingNumberState of matterLevel (video gaming)Line (geometry)Greatest elementSoftwareAnalytic setWeb 2.0Point (geometry)GoogolComputer animation
EmailVideo game consoleSource codeUniform resource locatorComa BerenicesCompilation albumProgrammable read-only memoryComputer iconExecution unitLemma (mathematics)Time zoneRow (database)RankingGamma functionVulnerability (computing)WebsiteSineData typeLibrary catalogWeb pageCore dumpTraffic reportingCASE <Informatik>Multiplication signInformationEmailWebsiteIntegrated development environmentDenial-of-service attackWeb browserFluid staticsWeb pageSoftwareNumberMalwareVector spaceOnline helpDependent and independent variablesAutomatic differentiationDirection (geometry)QuicksortClient (computing)Block (periodic table)State of matterMoment (mathematics)PiPoint (geometry)SpacetimeReal-time operating systemVirtual machineOffice suiteXMLComputer animation
MaizeRankingWeb pageDrum memoryMenu (computing)CalculusUniform resource locatorSummierbarkeitUDP <Protokoll>Android (robot)PlastikkarteHacker (term)Link (knot theory)Real-time operating systemTwitterLaserDenial-of-service attackMessage passingService (economics)Goodness of fitHydraulic jumpGame theoryBlogWebsiteBitWeb 2.0IP addressVideoconferencingMultiplication signEscape characterGreatest elementType theoryState of matterRow (database)Series (mathematics)Data miningComputer animation
UDP <Protokoll>Link (knot theory)Android (robot)Military operationWage labourHacker (term)Uniform resource locatorDomain nameType theoryLaserService (economics)Memory managementWebsiteOperator (mathematics)Goodness of fitMultiplication signOrder (biology)CountingDenial-of-service attackQuicksortMereologyContinuum hypothesisThread (computing)Metropolitan area networkNumberBitCuboidTrailSoftwareIP addressUser interfaceBlogAssociative propertyProcess (computing)Right angleHydraulic jumpRoundness (object)Scripting languageComputer iconOperational amplifierWeb pageThomas BayesOrbitCanonical ensembleHecke operatorGame theoryLie groupComputer clusterKey (cryptography)WhiteboardComa BerenicesSimilarity (geometry)Negative number2 (number)Arithmetic meanComputer animation
CAPTCHATape driveComputer networkStreaming mediaBootingElectronic mailing listService (economics)TheoryLine (geometry)SoftwareMereologySoftware testingComa BerenicesInterface (computing)PiInternet service providerQuicksortWordLevel (video gaming)NumberMathematical analysisVideoconferencingThresholding (image processing)Point cloudStress (mechanics)BitWebsitePasswordOnline gameTerm (mathematics)IP addressGoodness of fitShared memoryFamilyMotion captureSpecial unitary groupRobotWeb pageDenial-of-service attackStructural loadBookmark (World Wide Web)XML
Cellular automatonIRIS-TMaizeTorusHill differential equation10 (number)Term (mathematics)DialectInheritance (object-oriented programming)PasswordPoint (geometry)String (computer science)Traffic reportingPhysical systemMusical ensembleHash functionBit1 (number)DeterminismAlgorithmSign (mathematics)RobotBridging (networking)Address spaceEncryptionEmailComputer animation
Personal digital assistantPasswordHash functionReverse engineeringMiniDiscTwitterInformationString (computer science)Pressure volume diagramInheritance (object-oriented programming)Menu (computing)Musical ensemblePasswordInformationOrder (biology)Information securityResultantTraffic reportingQuicksortPosition operatorStress (mechanics)Pell's equationData storage deviceGraphics processing unitMultiplication signNumberNeuroinformatikWebsiteCybersexHash functionCoefficient of determinationPlanningStandard deviationComputer animation
Hacker (term)Computer-generated imageryNeuroinformatikWebsiteConnected spaceQuicksortHydraulic jumpTraffic reportingCASE <Informatik>SoftwareAlgorithmPerspective (visual)Coefficient of determinationWeb browserFreewarePasswordWeb 2.0NumberInformationServer (computing)Metropolitan area networkBitSign (mathematics)Moment (mathematics)Point (geometry)Information securityWave packetData conversionChainWireless LANGodMassDependent and independent variablesVirtual machineFilm editingThomas BayesAreaMultiplication signMilitary base
Computer-generated imageryWebsitePoint (geometry)Web browserPublic key certificateEncryptionVotingInformation securityType theoryComputer animation
Discrete element methodComputer-generated imageryProgrammable read-only memoryMultiplication signWebsiteMoment (mathematics)ResultantSoftwareWeb browserDigital photographyComputer animation
Video game consoleWeb pagePrice indexMenu (computing)Maxima and minimaGoogolComa BerenicesSource codeCodierung <Programmierung>EmailDependent and independent variablesHTTP cookieContent (media)Data typeComputer configurationCommunications protocolFormal languageWeb browserInternetworkingResultantDependent and independent variablesInformation securityNumberMaxima and minimaAddress spaceConnected spaceEmailBit2 (number)Parameter (computer programming)Coma BerenicesWebsiteDomain nameGoogolVideo gameProjective planeTrailExpressionEvent horizonComputer animationXML
Inclusion mapTime domainDomain nameElectronic mailing listGraphical user interfaceWebsiteTrigonometric functionsWeb browserInterface (computing)FreewareProjective planeWeb pageWebsiteInternetworkingMultiplication signMoment (mathematics)WhiteboardSoftware testingPoint (geometry)Interactive televisionBitXML
Euler anglesExecution unitNormed vector spaceHill differential equationSoftwareAddress spaceConnected spaceDistanceDigital photographyRight angleSoftware testingVirtuelles privates NetzwerkPerspective (visual)QuicksortInjektivitätDifferent (Kate Ryan album)Control flowBroadcasting (networking)Tablet computerSystem callCausalityMenu (computing)SpacetimeTerm (mathematics)WebsiteCommutatorDependent and independent variablesComputer programmingComputer-assisted translationMoment (mathematics)Source code
Software developerMessage passingJSONXMLUML
Transcript: English(auto-generated)