A4 and A2: Broken Applications
OWASP
| Intermediate
- 13 videos | 1h 6m 11s
- Includes Assessment
- Earns a Badge
OWASP Top 10 list items 4 and 2 involve applications with broken access controls and broken authentication and session management.
WHAT YOU WILL LEARN
-
explain what Broken Access Control ishow Broken Access Control can be exploited and what kind of access is needed to exploit ithow easy it is to detect Broken Access Control and how common they arethe technical and business impacts of Broken Access Controlprovide examples of Broken Access Control attacksguess URLs and parameters to gain access to web pages and dataexplain what Broken Authentication and Session Management is
-
how Broken Authentication and Session Management can be exploited and what kind of access is needed to exploit ithow easy it is to detect Broken Authentication and Session Management and how common they arethe technical and business impacts of Broken Authentication and Session Managementprovide examples of Broken Authentication and Session Management attacksretrieve sensitive data through password reset pageswhat an attacker can access if they exploit A4 or A2
IN THIS COURSE
-
5m 36s
-
8m 9s
-
5m 22s
-
4m 44s
-
7m 33s
-
2m 2s
-
4m 4s
-
5m 10s
-
5m 47s
-
4m 7s
-
5m 17s
-
2m 42s
-
5m 38s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.