CEH v11: CSRF, IDOR, LFI & RFI Attacks
Ethical Hacker v11
| Intermediate
- 3 videos | 39m 36s
- Includes Assessment
- Earns a Badge
Cross-Site Request Forgery, Direct Object Reference, and Local and Remote File Inclusion attacks can prove very harmful to web applications. In this course, you'll examine how these attacks work and how to recognize them. First, you'll explore CSRF attacks and how they can be leveraged to attack users. Next, you'll learn about the IDOR attack, including how to find and exploit it. Finally, you'll learn about LFI and RFI attacks, including how they work and how they can be leveraged to gain access to a remote system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
Recognize how cross site request forgery (csrf) attacks workidentify how cross site request forgery (csrf) attacks can be leveraged by attackersIdentify insecure direct object reference (idor) attacks and how to exploit it
-
Describe how remote and local file inclusion attacks can be leveraged to gain access to a remote systemdescribe the difference between remote and local file inclusion attacksrecognize how remote and local file inclusion attacks work
IN THIS COURSE
-
14m 4sIn this video, you will learn how Cross Site Request Forgery (CSRF) attacks can be leveraged by attackers. FREE ACCESS
-
4m 58sIn this video, you will identify Insecure Direct Object Reference (IDOR) attacks and how to exploit them. FREE ACCESS
-
20m 34sUpon completion of this video, you will be able to recognize how remote and local file inclusion attacks work. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.