« There's a New AppScan In Town | Main | Google Chrome Universal XSS Vulnerability »

February 27, 2009

Comments

Nathan

WOW! Pretty amazing stuff. I was reading this from the airport's hotspot - Hope I wasn't infected :)
I liked the double active attack concepts described in your slides.
Would you expect more of your Active attacks to be identified in the future?

Roi Saltzman

Hi Nathan,
Since the nature of the Active attack scenarios we described (i.e. Stealing session cookies, Cache poisoning) is that of design, not implementation - it is entirely feasible that we will see new Active attack scenarios in the future.

The comments to this entry are closed.

Follow us on Twitter

AppScan Free Trial


Try IBM Security AppScan software at no charge.

Become a Fan

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy