A4 and A2: Broken Applications

OWASP    |    Intermediate
  • 13 videos | 1h 6m 11s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 333 users Rating 4.6 of 333 users (333)
OWASP Top 10 list items 4 and 2 involve applications with broken access controls and broken authentication and session management.

WHAT YOU WILL LEARN

  • Explain what broken access control is
    How broken access control can be exploited and what kind of access is needed to exploit it
    How easy it is to detect broken access control and how common they are
    The technical and business impacts of broken access control
    Provide examples of broken access control attacks
    Guess urls and parameters to gain access to web pages and data
    Explain what broken authentication and session management is
  • How broken authentication and session management can be exploited and what kind of access is needed to exploit it
    How easy it is to detect broken authentication and session management and how common they are
    The technical and business impacts of broken authentication and session management
    Provide examples of broken authentication and session management attacks
    Retrieve sensitive data through password reset pages
    What an attacker can access if they exploit a4 or a2

IN THIS COURSE

  • 5m 36s
    After completing this video, you will be able to explain what Broken Access Control is. FREE ACCESS
  • 8m 9s
    Find out how Broken Access Control can be exploited and what kind of access is needed to exploit it. FREE ACCESS
  • Locked
    3.  A4 - Broken Access Control Detection
    5m 22s
    In this video, find out how easy it is to detect Broken Access Control and how common they are. FREE ACCESS
  • Locked
    4.  A4 - Broken Access Control Impacts
    4m 44s
    In this video, you will learn about the technical and business impacts of Broken Access Control. FREE ACCESS
  • Locked
    5.  A4 - Broken Access Control Attacks
    7m 33s
    After completing this video, you will be able to provide examples of Broken Access Control attacks. FREE ACCESS
  • Locked
    6.  A4 - Use Forced Browsing to Access Data
    2m 2s
    During this video, you will learn how to guess URLs and parameters to gain access to web pages and data. FREE ACCESS
  • Locked
    7.  A2 - Broken Authentication and Session Management
    4m 4s
    After completing this video, you will be able to explain what Broken Authentication and Session Management is. FREE ACCESS
  • Locked
    8.  A2 - Session Management Exploits
    5m 10s
    Find out how Broken Authentication and Session Management can be exploited and what kind of access is needed to exploit it. FREE ACCESS
  • Locked
    9.  A2 - Session Management Vulnerability Detection
    5m 47s
    In this video, you will learn how easy it is to detect Broken Authentication and Session Management and how common they are. FREE ACCESS
  • Locked
    10.  A2 -Session Management Impacts
    4m 7s
    In this video, you will learn about the technical and business impacts of Broken Authentication and Session Management. FREE ACCESS
  • Locked
    11.  A2 - Session Management Attacks
    5m 17s
    After completing this video, you will be able to provide examples of Broken Authentication and Session Management attacks. FREE ACCESS
  • Locked
    12.  A2 - Exploit Password Reset Pages
    2m 42s
    Find out how to retrieve sensitive data through password reset pages. FREE ACCESS
  • Locked
    13.  Exercise: What Can An Attacker Do With A4 and A2
    5m 38s
    In this video, you will see what an attacker can access if they exploit A4 or A2. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 1111 users Rating 4.6 of 1111 users (1111)
Rating 4.6 of 91 users Rating 4.6 of 91 users (91)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 336 users Rating 4.6 of 336 users (336)
Rating 4.6 of 498 users Rating 4.6 of 498 users (498)
Rating 4.5 of 356 users Rating 4.5 of 356 users (356)