-
-
Save ImaginaryBIT/d79894f2e31973b0416a2e443dba5aa6 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
SDLC -> Trust Boundary | |
risk assessment -> Security Requirements -> Abuse Cases -> Threat Modeling -> Security Architecture (hardware or software) -> SSCR(static) -> Pentest (dynamic) | |
Security Testing for Agile/DevOps and DevSecOps | |
- Infrastructure as Code | |
- Continuous Integration and Continuous Delivery | |
- security activities are being automated as much as possible | |
Basic Tampering Techniques | |
- Binary Patching | |
- Code Injection | |
Static and Dynamic Binary Analysis | |
- Using Disassemblers and Decompilers | |
- Debugging and Tracing | |
Advanced Techniques | |
- Dynamic Binary Instrumentation | |
- Emulation-based Dynamic Analysis | |
- Custom Tooling with Reverse Engineering Frameworks | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment