CEH v12: IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks

CEH v12    |    Intermediate
  • 3 videos | 52m 28s
  • Includes Assessment
  • Earns a Badge
Direct Object Reference and Local and Remote File Inclusion attacks can prove very harmful to web applications. In this course, you'll examine how these attacks work and how to recognize them. First, you'll learn about Insecure Direct Object Reference (IDOR) attacks, including how to find and exploit them. Next, you'll learn about Local File Inclusion (LFI) and Remote File Inclusion (RFI) attacks, including how they work and how they can be leveraged to gain access to a remote system. Many of today's web applications utilize an application programming interface (API) to facilitate interaction between clients and services. To wrap up this course, you'll learn about attributes of APIs, how they compare with webhooks, and common vulnerabilities and security countermeasures associated with both APIs and webhooks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Identify insecure direct object reference (idor) attacks and how to exploit it
    Describe the difference between remote and local file inclusion attacks
    recognize how remote and local file inclusion attacks work
    describe how remote and local file inclusion attacks can be leveraged to gain access to a remote system
  • Recognize the attributes of apis
    recognize the features of webhooks
    describe common api vulnerabilities
    identify the steps to the api hacking methodology

IN THIS COURSE

  • Locked
    1.  Insecure Direct Object Reference (IDOR) Attacks
    9m 26s
    Upon completion of this video, you will be able to describe the Insecure Direct Object Reference (IDOR) attack, including how to find and exploit it. FREE ACCESS
  • Locked
    2.  Local File and Remote File Inclusion Attacks
    22m 38s
    After completing this video, you will be able to describe the Local File Inclusion (LFI) and Remote File Inclusion (RFI) attacks, including how they work and how they can be leveraged to gain access to a remote system. FREE ACCESS
  • Locked
    3.  APIs and Webhooks
    20m 25s
    Upon completion of this video, you will be able to recognize the attributes of APIs, compare them with webhooks, and list common API vulnerabilities and security countermeasures associated with both. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.