CEH v11: CSRF, IDOR, LFI & RFI Attacks

Ethical Hacker v11    |    Intermediate
  • 3 Videos | 39m 36s
  • Includes Assessment
  • Earns a Badge
Cross-Site Request Forgery, Direct Object Reference, and Local and Remote File Inclusion attacks can prove very harmful to web applications. In this course, you'll examine how these attacks work and how to recognize them. First, you'll explore CSRF attacks and how they can be leveraged to attack users. Next, you'll learn about the IDOR attack, including how to find and exploit it. Finally, you'll learn about LFI and RFI attacks, including how they work and how they can be leveraged to gain access to a remote system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Identify how Cross Site Request Forgery (CSRF) attacks can be leveraged by attackers
    recognize how Cross Site Request Forgery (CSRF) attacks work
    identify Insecure Direct Object Reference (IDOR) attacks and how to exploit it
  • describe how remote and local file inclusion attacks can be leveraged to gain access to a remote system
    describe the difference between remote and local file inclusion attacks
    recognize how remote and local file inclusion attacks work

IN THIS COURSE

  • Locked
    1. 
    Cross-Site Request Forgery Attacks
    14m 4s
  • Locked
    2. 
    Insecure Direct Object Reference Attacks
    4m 58s
  • Locked
    3. 
    Local File and Remote File Inclusion Attacks
    20m 34s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.