We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
SAINTCON 2023 - Christopher Forte - Full Stack for "Hackers"
Discover how full stack development is crucial for both hackers and engineers, learning to code, handle obfuscation, and recreate environments while avoiding complexity and vulnerability in this studio presentation.
- Full stack development is important for both hackers and engineers.
- Developers can benefit from learning how to code, handling obfuscation, and recreating environments.
- Automation and standardization can be useful for both sides, but also lead to complexity and vulnerability.
- Engineers can use tools like HashiCorp’s Vault and Ansible to manage infrastructure and secrets.
- Understanding the full stack can help in both defensive and offensive sides of security.
- A lot of people tend to focus on specific languages or technologies, but it’s important to be familiar with different paradigms and approaches.
- Developers should focus on writing efficient and secure code, and use tools to automate testing and deployment.
- Hackers can use tools like Terraform, Ansible, and Pulumi to manage infrastructure and deploy attacks.
- The full stack is becoming increasingly complicated, with cloud engineers and network engineers playing important roles.
- Developers should be careful about secrets management, and use tools like HashiCorp’s Vault to manage secrets and certificates.
- It’s important to understand the implications of different technologies and approaches on security.
- Hackers can use tools like Docker and Kubernetes to manage containers and orchestrate attacks.
- Automation and standardization can lead to efficiency and speed, but also lead to complexity and vulnerability.
- Developers should focus on writing secure and reliable code, and use tools to automate testing and deployment.
- The full stack is becoming increasingly important for both hackers and engineers.
- Hackers can use tools like phishing kits to gather information about a system.
- Developers should focus on writing secure and reliable code, and use tools to automate testing and deployment.
- Hackers can use tools like RECON-ng to gather information about a system.
- The full stack is becoming increasingly important for both hackers and engineers.
- Hackers can use tools like Burp Suite to gather information about a system.
- Developers should focus on writing secure and reliable code, and use tools to automate testing and deployment.
- Hackers can use tools like Nmap to gather information about a system.
- The full stack is becoming increasingly important for both hackers and engineers.
- Hackers can use tools like eighty to gather information about a system.
- Developers should focus on writing secure and reliable code, and use tools to automate testing and deployment.
- Hackers can use tools like SpoofF to gather information about a system.
- The full stack is becoming increasingly important for both hackers and engineers.
- Hackers can use tools like comac to gather information about a system.
- Developers should focus on writing secure and reliable code, and use tools to automate testing and deployment.
- Hackers can use tools like FUD to gather information about a system.
- The full stack is becoming increasingly important for both hackers and engineers.
- Hackers can use tools like Authdump to gather information about a system.
- Developers should focus on writing secure and reliable code, and use tools to automate testing and deployment.
- Hackers can use tools like Crackit to gather information about a system.
- The full stack is becoming increasingly important for both hackers