A4 and A2: Broken Applications
OWASP
| Intermediate
- 13 videos | 1h 6m 11s
- Includes Assessment
- Earns a Badge
OWASP Top 10 list items 4 and 2 involve applications with broken access controls and broken authentication and session management.
WHAT YOU WILL LEARN
-
Explain what broken access control isHow broken access control can be exploited and what kind of access is needed to exploit itHow easy it is to detect broken access control and how common they areThe technical and business impacts of broken access controlProvide examples of broken access control attacksGuess urls and parameters to gain access to web pages and dataExplain what broken authentication and session management is
-
How broken authentication and session management can be exploited and what kind of access is needed to exploit itHow easy it is to detect broken authentication and session management and how common they areThe technical and business impacts of broken authentication and session managementProvide examples of broken authentication and session management attacksRetrieve sensitive data through password reset pagesWhat an attacker can access if they exploit a4 or a2
IN THIS COURSE
-
5m 36sAfter completing this video, you will be able to explain what Broken Access Control is. FREE ACCESS
-
8m 9sFind out how Broken Access Control can be exploited and what kind of access is needed to exploit it. FREE ACCESS
-
5m 22sIn this video, find out how easy it is to detect Broken Access Control and how common they are. FREE ACCESS
-
4m 44sIn this video, you will learn about the technical and business impacts of Broken Access Control. FREE ACCESS
-
7m 33sAfter completing this video, you will be able to provide examples of Broken Access Control attacks. FREE ACCESS
-
2m 2sDuring this video, you will learn how to guess URLs and parameters to gain access to web pages and data. FREE ACCESS
-
4m 4sAfter completing this video, you will be able to explain what Broken Authentication and Session Management is. FREE ACCESS
-
5m 10sFind out how Broken Authentication and Session Management can be exploited and what kind of access is needed to exploit it. FREE ACCESS
-
5m 47sIn this video, you will learn how easy it is to detect Broken Authentication and Session Management and how common they are. FREE ACCESS
-
4m 7sIn this video, you will learn about the technical and business impacts of Broken Authentication and Session Management. FREE ACCESS
-
5m 17sAfter completing this video, you will be able to provide examples of Broken Authentication and Session Management attacks. FREE ACCESS
-
2m 42sFind out how to retrieve sensitive data through password reset pages. FREE ACCESS
-
5m 38sIn this video, you will see what an attacker can access if they exploit A4 or A2. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.