Magnus K Karlsson

I'm dedicated agile security architect/system architect/developer with specialty of open source framework.

October 27, 2018

Oracle Code One 2018 Hacking and Hardening Java Web Applications

https://s3.amazonaws.com/cmj-presentations/Hacking+and+Hardening+Java+Web+Apps+-+OC12018.pdf

Kali Linux Varient Virtual Machine https://s3.amazonaws.com/cmj-presentations/hacking-uberconf-2016/hhjwa-2016.1-vbox-amd64.ova

https://s3.amazonaws.com/cmj-presentations/hacking-rwx-2017/Hacking_and_Hardening_Java_Web_Applications.pdf

https://github.com/cjudd/wordyninjablog

https://github.com/cjudd/hacking-and-hardening-java-web-apps-workshop

at October 27, 2018
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

My photo
Magnus K Karlsson
Jag arbetar sedan 2016 på Antigo med IT-säkerhet, systemarkitektur och utveckling. Där arbetar jag inom branscher som Myndighet, Finansiell handel och Media. Tidigare har jag arbetat inom Transport och Telekom branscher.

Men det jag brinner för är enkla och lättrörliga arkitekturlösningar. Mitt motto är: när det inte går att förenkla en lösning mera, så är man klar.

Privat så är jag en stolt trebarnspappa, som tycker om aktivt umgänge med vänner och familjer, som segling, golf och vandring i skog och natur.

Credly Magnus Karlsson

CISSP, CCSP
RHCA, RHCE, RHCSA, RHCS{
 - Security: Linux
  - MultiCluster Management
  - OpenShift Automation and Integration
  - OpenShift Application Development
  - OpenShift Administration
  - Containers and Kubernetes}
Spring Certified Professional 2023
SC{EA, WCD, JD, JP}
View my complete profile

Search This Blog

Blog Archive

  • ►  2024 (10)
    • ►  August (8)
    • ►  July (2)
  • ►  2023 (16)
    • ►  September (2)
    • ►  August (9)
    • ►  July (1)
    • ►  January (4)
  • ►  2022 (57)
    • ►  November (7)
    • ►  October (12)
    • ►  September (1)
    • ►  July (31)
    • ►  June (4)
    • ►  May (2)
  • ►  2021 (15)
    • ►  June (1)
    • ►  May (3)
    • ►  April (1)
    • ►  March (9)
    • ►  February (1)
  • ►  2020 (14)
    • ►  November (11)
    • ►  March (1)
    • ►  February (2)
  • ►  2019 (40)
    • ►  December (3)
    • ►  November (2)
    • ►  October (9)
    • ►  September (6)
    • ►  August (7)
    • ►  June (5)
    • ►  May (1)
    • ►  April (4)
    • ►  March (2)
    • ►  February (1)
  • ▼  2018 (57)
    • ►  November (9)
    • ▼  October (32)
      • JSF 2.0 (EE 6) Feature Red Hat JBoss EAP 6
      • Using JAAS in Tomcat Example
      • Scanning Your System with OpenSCAP
      • Java Smart Card APDU Commands
      • Requiring SSL client authentication in a user frie...
      • OWASP XSS (Cross-Site Scripting)
      • Oracle Code One 2018 Hacking and Hardening Java We...
      • Oracle Code One 2018 Angular for Java developers
      • Oracle Code One 2018 Jakarta EE (EE 8) Hands-On Lab
      • HTTP Caching
      • Smart Card Support in RHEL 7
      • X.509 Standard set of attributes order
      • All HTTP Status Code and How They Fits Together
      • CSRF Support Out-Of-Box in EE 7 (JSF 2.2)
      • How to Set System Properties via File in EAP 6
      • OWASP Dependency Check
      • Monitoring and Health Check in JBoss EAP 6
      • How to Generate WADL in JBoss EAP 7
      • Exception Handling in JAX-RS 1.1 (EE 6)
      • JavaEE 8 Deployment Descriptor
      • CSRFGuard by OWASP
      • How To Install VirtualBox on Fedora 28
      • OpenJDK Mission Control 7 on Fedora 28
      • Input Validation - OWASP Java HTML Sanitizer
      • JavaFX Markup for User Interface
      • ControlsFX Excellent JavaFX Framework
      • Bulkhead and Backpressure Pattern with Java EE 7
      • Circuit Breaker Pattern with Java EE 7
      • Applet and Java Web Start is Dead in Java 11
      • Oracle JDK for Windows is Not Free Anymore
      • Java Microservice Framework
      • Servless/Function-as-a-service, FaaS
    • ►  July (1)
    • ►  June (1)
    • ►  May (8)
    • ►  April (3)
    • ►  March (1)
    • ►  February (2)
  • ►  2017 (83)
    • ►  December (23)
    • ►  November (24)
    • ►  October (1)
    • ►  September (1)
    • ►  July (3)
    • ►  June (4)
    • ►  May (11)
    • ►  March (3)
    • ►  January (13)
  • ►  2016 (75)
    • ►  December (1)
    • ►  November (11)
    • ►  September (14)
    • ►  August (8)
    • ►  July (4)
    • ►  June (18)
    • ►  May (2)
    • ►  April (3)
    • ►  March (14)
  • ►  2015 (31)
    • ►  December (4)
    • ►  September (1)
    • ►  August (4)
    • ►  July (4)
    • ►  June (2)
    • ►  May (1)
    • ►  March (4)
    • ►  February (10)
    • ►  January (1)
  • ►  2014 (73)
    • ►  December (10)
    • ►  October (1)
    • ►  August (7)
    • ►  June (10)
    • ►  May (1)
    • ►  April (5)
    • ►  March (25)
    • ►  February (3)
    • ►  January (11)
  • ►  2013 (68)
    • ►  December (10)
    • ►  November (11)
    • ►  October (4)
    • ►  August (4)
    • ►  July (1)
    • ►  June (7)
    • ►  May (5)
    • ►  March (1)
    • ►  February (3)
    • ►  January (22)
  • ►  2012 (39)
    • ►  December (2)
    • ►  November (5)
    • ►  September (2)
    • ►  August (4)
    • ►  July (4)
    • ►  June (5)
    • ►  May (3)
    • ►  April (4)
    • ►  March (3)
    • ►  January (7)
  • ►  2011 (6)
    • ►  November (4)
    • ►  February (2)
  • ►  2010 (23)
    • ►  October (8)
    • ►  August (1)
    • ►  July (2)
    • ►  June (2)
    • ►  April (1)
    • ►  March (1)
    • ►  February (7)
    • ►  January (1)
  • ►  2009 (38)
    • ►  December (2)
    • ►  November (5)
    • ►  October (5)
    • ►  September (1)
    • ►  August (4)
    • ►  July (4)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (7)
    • ►  January (7)
  • ►  2008 (6)
    • ►  December (1)
    • ►  October (5)

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Followers

  • How to Setup and Use Artifactory as Proxy/Mirror for Remote Repositories
    In this blog I will discuss and show you how to setup and use Artifactory as proxy (mirror) for remote repositories, such as Central Maven ...
  • Entity Control Boundary (ECB) Pattern
    Introduction The Entity Control Boundary (ECB) pattern is and old pattern that was published by Ivar Jacobson (Ericsson Co.) in 80's. ...
  • How to Read PEM PKCS#1 or PKCS#8 Encoded Private Key In Java
    import java.io.InputStream; import java.math.BigInteger; import java.nio.file.Files; import java.nio.file.Paths; import java.security.KeyFa...

StatCounter

Simple theme. Powered by Blogger.