A7 and A6: Leaky and Unprepared Applications

OWASP    |    Intermediate
  • 18 videos | 1h 1m 7s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 383 users Rating 4.5 of 383 users (383)
OWASP Top 10 list items 7 and 6 involve applications that expose sensitive data and are not protected from modern attacks.

WHAT YOU WILL LEARN

  • Describe what insufficient attack protection is
    Exploit insufficient attack protection and what kind of access is needed to exploit it
    Use nmap to scan a network
    Detect insufficient attack protection and note how common it is
    Use online web app scanners
    Describe the client/server http exchange
    Analyze linux log rotation files for a linux web server
    List the technical and business impacts of insufficient attack protection
    Discuss attacks that take advantage of insufficient attack protection
  • Describe what sensitive data exposure is
    Analyze sensitive network traffic in linux
    Describe how sensitive data exposure can be exploited
    Review how sensitive data exposure can be exploited and what kind of access is needed to exploit it
    Describe how easy it is to detect sensitive data exposure and how common it is
    List the technical and business impacts of sensitive data exposure
    Describe how various attacks can result in sensitive data exposure
    Provide examples of sensitive data exposure attacks
    Describe the impact of these exploits on the business and technical sides

IN THIS COURSE

  • 6m 33s
    After completing this video, you will be able to describe what insufficient attack protection is. FREE ACCESS
  • 3m 31s
    During this video, you will learn how to exploit insufficient attack protection and what kind of access is needed to exploit it. FREE ACCESS
  • Locked
    3.  A7 - Scan for Web Servers
    3m 11s
    In this video, find out how to use nmap to scan a network for open ports. FREE ACCESS
  • Locked
    4.  A7 - Insufficient Attack Protection Detection
    5m 50s
    In this video, you will detect insufficient attack protection and note how common it is. FREE ACCESS
  • Locked
    5.  A7 - Scan a Web App for Vulnerabilities
    2m 19s
    Find out how to use online web app scanners. FREE ACCESS
  • Locked
    6.  A7 - Analyze HTTP Traffic Using WireShark
    3m 56s
    Upon completion of this video, you will be able to describe the HTTP exchange between a client and a server. FREE ACCESS
  • Locked
    7.  A7 - Analyzing Log Rotation Files
    2m 12s
    Learn how to analyze Linux log rotation files for a Linux web server. FREE ACCESS
  • Locked
    8.  A7 - Insufficient Attack Protection Impacts
    4m 32s
    After completing this video, you will be able to list the technical and business impacts of insufficient attack protection. FREE ACCESS
  • Locked
    9.  A7 - Insufficient Attack Protection Attacks
    4m 12s
    Learn how to discuss attacks that take advantage of insufficient protection. FREE ACCESS
  • Locked
    10.  A6 - Sensitive Data Exposure
    4m 15s
    After completing this video, you will be able to describe what sensitive data exposure is and how to prevent it. FREE ACCESS
  • Locked
    11.  A6 - Analyzing Sensitive Network Traffic
    1m 26s
    In this video, you will learn how to analyze sensitive network traffic in Linux. FREE ACCESS
  • Locked
    12.  A6 - Sensitive Data Exposure Exploits Overview
    3m 12s
    Upon completion of this video, you will be able to describe how sensitive data exposure can lead to exploitation. FREE ACCESS
  • Locked
    13.  A6 - Sensitive Data Exposure Exploits
    3m 28s
    In this video, you will review how sensitive data exposure can be exploited and what kind of access is needed to exploit it. FREE ACCESS
  • Locked
    14.  A6 - Sensitive Data Exposure Detection
    2m
    After completing this video, you will be able to describe how easy it is to detect sensitive data exposure and how common it is. FREE ACCESS
  • Locked
    15.  A6 - Sensitive Data Exposure Impacts
    1m 27s
    Upon completion of this video, you will be able to list the technical and business impacts of sensitive data exposure. FREE ACCESS
  • Locked
    16.  A6 - Sensitive Data Exposure Attacks
    3m 40s
    After completing this video, you will be able to describe how various attacks can result in the exposure of sensitive data. FREE ACCESS
  • Locked
    17.  A6 - Demonstrating Sensitive Exposure Attacks
    2m 33s
    After completing this video, you will be able to provide examples of sensitive data exposure attacks. FREE ACCESS
  • Locked
    18.  Exercise: Describe the Impact of A7 and A6
    2m 51s
    Upon completion of this video, you will be able to describe the impact of these exploits on the business and technical sides. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 119 users Rating 4.6 of 119 users (119)
Rating 4.6 of 396 users Rating 4.6 of 396 users (396)
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 336 users Rating 4.6 of 336 users (336)
Rating 4.6 of 1111 users Rating 4.6 of 1111 users (1111)
Rating 4.5 of 354 users Rating 4.5 of 354 users (354)