Companies Home Search Profile

Full-Stack Attacks on Modern Web Applications

Focused View

Dawid Czagan

59:07

3 View
  • 1. Introduction.mp4
    01:16
  • 1. HTTP Parameter Pollution Part 1.mp4
    06:02
  • 1. HTTP Parameter Pollution Part 2.mp4
    10:18
  • 1. Subdomain Takeover Part 1.mp4
    10:28
  • 1. Subdomain Takeover Part 2.mp4
    02:34
  • 1. Account Takeover via Clickjacking Part 1.mp4
    24:07
  • 1. Account Takeover via Clickjacking Part 2.mp4
    04:22
  • Description


    Learn About HTTP Parameter Pollution, Subdomain Takeover, and Advanced Clickjacking

    What You'll Learn?


    • Dive into full-stack attacks on modern web application
    • Learn how an attacker can bypass authorization via HTTP parameter pollution
    • Explore how the attacker can launch a subdomain takeover attack
    • Discover how the attacker can take over a user’s account via clickjacking
    • Learn step by step how all these attacks work in practice (DEMOS)
    • Check if your web applications are vulnerable to these attacks
    • Become a successful penetration tester / red team member / ethical hacker
    • Learn from one of the top hackers at HackerOne

    Who is this for?


  • Penetration testers, red team members, ethical hackers, bug hunters, security engineers / consultants
  • What You Need to Know?


  • Basic hacking skills
  • More details


    Description

    Web application security is not only about XSS and SQL injection. Professional penetration testers and red team members must learn about full-stack attacks on modern web applications and I created this course to help you on this journey.

    In this course, you will learn about 3 powerful attacks. First, I'll show you how an attacker can bypass authorization via HTTP parameter pollution. Next, I'll present how the attacker can launch a subdomain takeover attack. Finally, I'll demonstrate how the attacker can take over a user’s account via clickjacking.

    ** For every single attack presented in this course there is a demo ** so that you can learn step by step how these attacks work in practice. You'll also learn how to check if your web applications are vulnerable to these attacks. I hope this sounds good to you and I can’t wait to see you in the class.

    • Case #1:  HTTP Parameter Pollution – Part 1

    • Case #1:  HTTP Parameter Pollution – Part 2

    • Case #2: Subdomain Takeover – Part 1

    • Case #2: Subdomain Takeover – Part 2

    • Case #3: Account Takeover via Clickjacking – Part 1

    • Case #3: Account Takeover via Clickjacking – Part 2

    Note: you can get paid for these bugs in bug bounty programs.

    Who this course is for:

    • Penetration testers, red team members, ethical hackers, bug hunters, security engineers / consultants

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dawid Czagan
    Dawid Czagan
    Instructor's Courses
    Dawid Czagan is listed among Top 10 Hackers (HackerOne). He has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter and other companies. Due to the severity of many bugs, he received numerous awards for his findings.Dawid Czagan shares his security bug hunting experience in his hands-on trainings “Hacking Web Applications – Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More” and “Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation”. He delivered security training courses at key industry conferences such as Hack In The Box (Amsterdam), CanSecWest (Vancouver), 44CON (London), Hack In Paris (Paris), DeepSec (Vienna), HITB GSEC (Singapore), BruCON (Ghent) and for many corporate clients. His students include security specialists from Oracle, Adobe, ESET, ING, Red Hat, Trend Micro, Philips and government sector.Dawid Czagan is a founder and CEO at Silesia Security Lab – a company which delivers specialized security testing and training services. To find out about the latest in Dawid Czagan’s work, you are invited to follow him on Twitter.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 7
    • duration 59:07
    • Release Date 2024/02/15