Through Nefarious Eyes by Joe Bruno
Details
What do attackers see when they look at your product, company, application, or even you. What perks their interest? How do they recon a target? What tools do they often use? As developers, it's our responsibility to be aware of potential security issues, to evaluate and mitigate that risk, and to protect the rights and freedoms of our customers and users. To that end, we'll walk through various methodologies and approaches employed by attackers to investigate and exploit targets, examine common attack vectors, and explore practical steps we can take to harden our modern client-heavy web applications.