
Sign up to save your podcasts
Or


We're getting close to two full decades of celebrating web hacking techniques. James Kettle shares which was his favorite, why the list is important to the web hacking community, and what inspires the kind of research that makes it onto the list. We discuss why we keep seeing eternal flaws like XSS and SQL injection making these lists year after year and how clever research is still finding new attack surfaces in old technologies. But there's a lot of new web technology still to be examined, from HTTP/2 and HTTP/3 to WebAssembly.
Segment Resources:
Show Notes: https://securityweekly.com/asw-318
By Security Weekly Productions4.8
44 ratings
We're getting close to two full decades of celebrating web hacking techniques. James Kettle shares which was his favorite, why the list is important to the web hacking community, and what inspires the kind of research that makes it onto the list. We discuss why we keep seeing eternal flaws like XSS and SQL injection making these lists year after year and how clever research is still finding new attack surfaces in old technologies. But there's a lot of new web technology still to be examined, from HTTP/2 and HTTP/3 to WebAssembly.
Segment Resources:
Show Notes: https://securityweekly.com/asw-318

7,608 Listeners

373 Listeners

268 Listeners

374 Listeners

655 Listeners

1,023 Listeners

8,041 Listeners

181 Listeners

182 Listeners

315 Listeners

74 Listeners

57 Listeners

138 Listeners

41 Listeners

44 Listeners