CEH v11: CSRF, IDOR, LFI & RFI Attacks
Ethical Hacker v11 | Intermediate
- 3 Videos | 39m 36s
- Includes Assessment
- Earns a Badge
Cross-Site Request Forgery, Direct Object Reference, and Local and Remote File Inclusion attacks can prove very harmful to web applications. In this course, you'll examine how these attacks work and how to recognize them. First, you'll explore CSRF attacks and how they can be leveraged to attack users. Next, you'll learn about the IDOR attack, including how to find and exploit it. Finally, you'll learn about LFI and RFI attacks, including how they work and how they can be leveraged to gain access to a remote system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
recognize how Cross Site Request Forgery (CSRF) attacks workIdentify how Cross Site Request Forgery (CSRF) attacks can be leveraged by attackersidentify Insecure Direct Object Reference (IDOR) attacks and how to exploit it
describe how remote and local file inclusion attacks can be leveraged to gain access to a remote systemdescribe the difference between remote and local file inclusion attacksrecognize how remote and local file inclusion attacks work
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.