You are going to be using OWASP Juice Shop throughout this course. You will attempt to hack it, and you will assess its code to learn how to identify hacking …
The course consists of three quizzes. Quizzes are for practice, and they do not contribute towards your final score. They’re a fantastic opportunity for you to check your progress and …
This course will cover the ten most critical web application security risks, with a brief review and discussion of each risk, followed by a hands-on part in which you will …
What makes an application vulnerable? If your application does not use secure protocols, such as HTTPS, it will transmit data in clear text, both internally and over the internet. This …
In previous videos, we saw that OWASP Juice Shop used JSON Web Tokens to store several claims. JSON Web Tokens are used to securely transfer data between two parties. These …
In the coming week, we will focus on: sensitive data exposure XML external entities broken access control security misconfiguration By the end of this week, you will be able to: …
In the coming week, we will cover the following topics: cross-site scripting (XSS) insecure deserialization using components with known vulnerabilities insufficient logging and monitoring By the end of this week, …
This video will take you through an attempt to upload malicious files to a database on the OWASP Juice Shop and show you what information can be gathered from a …
This video explains how to identify vulnerabilities to injection attacks by assessing the source code. Additionally, how to prevent these injection flaws from occurring is also explained. Reading source code …
This video demonstrates how to use the OWASP Juice Shop to demonstrate how a hacker may try to access an application. Throughout this course, you will use OWASP Juice Shop …
In the last video, you learned about injection flaws, and you now understand that every data source is a potential attack target. This video explains why injection threats are dangerous …
This video explains what injection and payload refer to in the context of cybersecurity and how these concepts are important for understanding how hackers can get access to your database. …
This video describes Extensible Markup Language (XML), the role of processors, and XML External Entities (XXE). In this video, you will see XML examples. XML is a markup language that …
In this video, you will learn about Hypertext Markup Language (HTML) and how HTML is used to display documents on web browsers. HTML is the standard markup language for documents …
This video explains the structure of the WWW and how HTTP acts as the communication channel between users and the web. In this video, you will learn about the structure …