Тёмный

We Need To Talk About The OWASP Top Ten 

Tib3rius
Подписаться 16 тыс.
Просмотров 1,6 тыс.
50% 1

Опубликовано:

 

10 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 12   
@Lorv0
@Lorv0 2 дня назад
Very very informative video! It would make sense to have a top 10 if it was for the most common risks… I really am not sure why OWASP seems to be failing at one thing that is the most important of all: proper and clear communication
@suknow2008
@suknow2008 3 дня назад
This is a very good articulation. Other than CVSS, EPSS provides a good view on actual exploitation probabilities. The Impact part is related to Exposure and Security Architecture. So CISA SSVC is a good model to use to determine actual criticality in any organization. SSVC requires internal teams to participate and cannot be handled only by external security testers.
@emmanuelwiseman6459
@emmanuelwiseman6459 4 дня назад
When I first encountered the owasp top ten back in 2019, it was way more easier to follow but as they years wore on, it's either something changes or a new vuln takes precedence. It's just a lot to follow now.
@docmalitt
@docmalitt 4 дня назад
Good I waited for you to finish because my 1st thought was - every 4 years?? Guess infosec world has changed so much in last 4 years I forgot when (frequency) the report is published. I am not a pro but simply an enthusiast yet I feel OWASP has gotten into the "survivor bias" problem, the WW2 research that watched the planes coming back from flights over Europe and wanting to put armor on places with most bullet holes in the fuselage. Missing the point that planes that had holes in other places didn't come back... frequency doesn't equal impact. Cheers.
@winson54
@winson54 4 дня назад
Have to agree with this. It shakes my head, when I am trying to understand what are the top 10 critical things i should pentest/exploit first on a web app. The current OWASP top 10 is indeed confusing and ironic. It should focus and rank based on the likelihood of the exploitation of each category or vulnerability and the subsequent impact (quantifiable).
@Tib3rius
@Tib3rius 4 дня назад
It's super confusing the way it's ordered now. Even if they keep the categorization, I don't think devs should be focused on cryptographic stuff as much as the top ten suggests they should be. 🤔
@asantoshkumarachary2692
@asantoshkumarachary2692 День назад
That's a nice insight, I have never thought of. Thank you.
@ArmadilloFactory
@ArmadilloFactory 19 часов назад
Thank you for this video! I have been complaining about OWASP Top10 being hot garbage for years. I feel so validated now :D
@bartekmakowski6072
@bartekmakowski6072 4 дня назад
Hmm . Very well thinked . They definitely should adapt more complexed measurements. Especially in this rapid changing industry or make it atleast sooner 4 years its like a age in cyberspace .
@Tib3rius
@Tib3rius 4 дня назад
I hope they get more volunteers so they can do it more often, and correctly.
@DarkDonnieMarco
@DarkDonnieMarco 4 дня назад
I think the OWASP top ten has become so condensed to try and include as much as possible that it is no longer useful. Sometimes I have to sit and think about which of the top ten a vuln fits into because there is so much overlap.
@Tib3rius
@Tib3rius 4 дня назад
Yeah I don't enjoy categorizing every vuln I find, but for some reason most pentesting companies do it.
Далее
Everyone Is Confused About the OSCP+
7:47
Просмотров 5 тыс.
Seja Gentil com os Pequenos Animais 😿
00:20
Просмотров 4,2 млн
Three Ways to Hack Mobile Apps
43:41
Просмотров 37 тыс.
8 AI Tools That Will Make You Rich in 2025!
15:58
Просмотров 11 тыс.
Yet another OSCP exam experience video
15:47
Просмотров 5 тыс.
Pentesting War Stories with Andy Swift
15:59
How to Pass The OSCP Exam
1:18:05
Просмотров 1,4 тыс.