Web hacking - Attacks & Defense discusses the Application security topics such as SQLI, XSS , Command injection , CSRF, LFI, Oauth2.0 ,etc .. It focuses on both Attacks and defense in depth of Web application security. This talk is for both pen-testers (who wants to learn different attacks techniques & bypasses for web applications) and Software Developers (who wants to learn defense in depth techniques to secure the web applications).
Lectures The Center offers free lectures specialized in information security periodically by experts in information security
Video or audio recording helps a criminal investigator to analyze the scene and to collect evidences. In this regards, a robust method is required to assure the originality of the recording. In this paper, we focus on the digital audio forensics and study how to extract the unique digital traces of any microphone. We perform feature extraction on the recording that is collected from several microphone models with at least two identical microphones of each model. Experimental results and analysis indicate that the signal of the sound recording of the identical microphone has different digital traces.