Detectify
Detectify
YouTube Video
  • Our second Meet The Hacker episode features none other than Fredrik Almroth, one of our founding security researchers and Head of Engineering! Some of you may know him as @almroot! At the office Fredrik is heading up our team to keep all Detectify’s users secure and our tool awesome. Out of office, he’s participating in high-profiled bug bounty programs and white hat hacking his way to help make ...

Detectify
Detectify
YouTube Video
  • Are you interested in ethical hacking but aren’t sure where to start? A formal degree is definitely not required. We sat down with one of our top-ranked Detectify Crowdsource hackers, Gerben Janssen van Doorn, and asked him about his white-hat journey so far. In this video he shares why XSS is key for getting started and its role in keeping your web security secure. Find out: * How did Gerben’s f...

Detectify
Detectify
YouTube Video
  • Have you ever wondered how a hacker would analyze and attack a Magento website? We picked the brains of two ethical hackers to find out. Detectify’s security experts Linus Särud and Fredrik Almroth share their insights and tips to help you keep your Magento store safe from hackers. Find out: * How Fredrik Almroth hacked one of the world’s largest e-commerce sites. * What any Magento website owner...

Detectify
Detectify
YouTube Video
  • OWASP Top 10 explained: Insecure Deserialization allows attackers to transfer a payload using serialized objects. This happens when integrity checks are not in place and deserialized data is not sanitized or validated. Watch our proof of concept video to learn more about Insecure Deserialization and how it compromises your security. For code examples and remediation tips, read our Insecure Deseri...

Detectify
Detectify
YouTube Video
  • OWASP Top 10 explained: Security Misconfiguration is a common vulnerability that can be found at any level of the application stack. If a component is susceptible to attack due to an insecure configuration, this can be classified as a security misconfiguration. Security misconfiguration flaws give attackers access to data or functionality, potentially resulting in a full takeover. Watch our proof...

Detectify
Detectify
YouTube Video
  • OWASP Top 10 explained: Watch our Proof of Concept video to find out more about Injection, the #1 OWASP vulnerability. We explain how an Injection vulnerability works and how a malicious hacker can exploit it. Subscribe to our YouTube channel to get notified when the next attack demo is posted! Don’t forget to check out blog for more educational security content: https://blog.detectify.com/

Detectify
Detectify
YouTube Video
  • OWASP Top 10 explained: Insufficient Logging & Monitoring can facilitate malicious activity and delay breach detection, incident response, and digital forensics. Watch our proof of concept video to learn more about Insufficient Logging & Monitoring and why it is considered a security issue. Subscribe to our YouTube channel to get notified when the next video is posted! For more educational secur...

Detectify
Detectify
YouTube Video
  • The concept of security questions has been questioned for a long time. Let’s start with this video just to demonstrate how easy it is to fully take over a PayPal account in under a minute. Note that two-factor authentication (2FA) was enabled for the account. The account was set up in Swedish, which is why the security questions are also in Swedish (The first question is “What was the name of you...

Detectify
Detectify
YouTube Video
  • OWASP Top 10 explained: Watch our Proof of Concept video to find out more about Injection, the #1 OWASP vulnerability. We explain how an Injection vulnerability works and how a malicious hacker can exploit it. Subscribe to our YouTube channel to get notified when the next attack demo is posted! Don’t forget to check out blog for more educational security content: https://blog.detectify.com/

Detectify
Detectify
YouTube Video
  • OWASP Top 10 explained: Missing Function Level Access Control occurs when the authentication check in sensitive request handlers is insufficient or non-existent. The impact of the vulnerability depends on the type of information the attacker can gain access to, but in the worst-case scenario, it can lead to a full system takeover. Watch our Proof of Concept video to find out how Missing Function...

Detectify
Detectify
YouTube Video
  • OWASP Top 10 explained: XSS (Cross-site scripting) is a widespread vulnerability that allows attackers to inject client-side scripts into web pages viewed by users. XSS is one of the most common vulnerabilities, but although it is easy to understand, it can also be part of complex chain attacks. Watch our attack demo to find out how XSS works and how hackers exploit it. If you’d like to read mor...

Detectify
Detectify
YouTube Video
  • OWASP Top 10 explained: Watch our Proof of Concept video to find out how attackers can exploit Components with Known Vulnerabilities and learn more about this OWASP Top 10 category. Subscribe to our YouTube channel to get notified when the next attack demo is posted! Don’t forget to check out blog for more educational security content: https://blog.detectify.com/

Detectify
Detectify
YouTube Video
  • We believe security should be part of your everyday workflow, which is why we love integrations that allow us to push Detectify notifications to the channels you already use. In this tutorial, we show you how to set up integrations with popular developer tools such as Slack, HipChat, JIRA, and Trello. Go Hack Yourself! https://detectify.com/

Detectify
Detectify
YouTube Video
Detectify
Detectify
YouTube Video
Detectify
Detectify
YouTube Video
  • There are many ways to customize your account in order to get the most out of Detectify! Watch this tutorial to learn how to set up subdomain scanning and fine-tune your scans by recording custom user behaviour, blocking Analytics services, setting up custom user agents and headers, and enabling request limits. Go Hack Yourself! https://detectify.com/

Detectify
Detectify
YouTube Video
  • There are many ways to customize your account in order to get the most out of Detectify! In this video, we show you how to work with Profile Settings that allow you to adjust your scan schedule, determine how long we should keep your security reports, and enable beta features. Go Hack Yourself! https://detectify.com/

Detectify
Detectify
YouTube Video
  • The Detectify OWASP Top 10 view gives you an overview of your site’s security status based on the OWASP Top 10 list of vulnerabilities. In this video, we show you how to interpret the results displayed in the OWASP Top 10 view. Go Hack Yourself! https://detectify.com/

Detectify
Detectify
YouTube Video
  • Once your scans are up and running, you can see your web application’s security status in the scan profile’s Overview. In this short video, we show you how to get the most out of your overview, covering key features such as the threat score, activity log, and the findings graph. Go Hack Yourself! https://detectify.com/

Detectify
Detectify
YouTube Video
  • If you have added and verified your domain, it’s time to add a scan profile to your Detectify account and start your first scan. Watch this tutorial for a short walkthrough of scan profile setup and your Detectify dashboard. Go Hack Yourself! https://detectify.com/

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.