
SCS24 03 Hidden Vulnerabilities
00:00 – Welcome! 00:11 – Writing code for CTFs (secure and intentionally insecure) 00:43 – Agenda 00:57 – Example: vulnerable nodejs application 02:12 – Example: php 03:25 – Example: python 04:54 – Example: C 06:25 – Example: php password strcmp 09:06 – Example: python yaml configuration 10:19 – Why secure…