CEH v12: IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks
CEH v12
| Intermediate
- 3 videos | 52m 28s
- Includes Assessment
- Earns a Badge
Direct Object Reference and Local and Remote File Inclusion attacks can prove very harmful to web applications. In this course, you'll examine how these attacks work and how to recognize them. First, you'll learn about Insecure Direct Object Reference (IDOR) attacks, including how to find and exploit them. Next, you'll learn about Local File Inclusion (LFI) and Remote File Inclusion (RFI) attacks, including how they work and how they can be leveraged to gain access to a remote system. Many of today's web applications utilize an application programming interface (API) to facilitate interaction between clients and services. To wrap up this course, you'll learn about attributes of APIs, how they compare with webhooks, and common vulnerabilities and security countermeasures associated with both APIs and webhooks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Identify insecure direct object reference (idor) attacks and how to exploit itDescribe the difference between remote and local file inclusion attacksrecognize how remote and local file inclusion attacks workdescribe how remote and local file inclusion attacks can be leveraged to gain access to a remote system
-
Recognize the attributes of apisrecognize the features of webhooksdescribe common api vulnerabilitiesidentify the steps to the api hacking methodology
IN THIS COURSE
-
9m 26sUpon completion of this video, you will be able to describe the Insecure Direct Object Reference (IDOR) attack, including how to find and exploit it. FREE ACCESS
-
22m 38sAfter completing this video, you will be able to describe the Local File Inclusion (LFI) and Remote File Inclusion (RFI) attacks, including how they work and how they can be leveraged to gain access to a remote system. FREE ACCESS
-
20m 25sUpon completion of this video, you will be able to recognize the attributes of APIs, compare them with webhooks, and list common API vulnerabilities and security countermeasures associated with both. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.