Companies Home Search Profile

Hacking Web Applications via PDFs, Images, and Links

Focused View

Dawid Czagan

51:08

133 View
  • 1. Introduction.mp4
    01:29
  • 1. Token Hijacking via PDF Part 1.mp4
    10:17
  • 1. Token Hijacking via PDF Part 2.mp4
    15:47
  • 1. XSS via Image Part 1.mp4
    04:06
  • 1. XSS via Image Part 2.mp4
    05:48
  • 1. User Redirection via window.opener Tabnabbing Part 1.mp4
    10:27
  • 1. User Redirection via window.opener Tabnabbing Part 2.mp4
    03:14
  • Description


    Learn How Your Web Applications Can Be Hacked via PDFs, Images, and Links

    What You'll Learn?


    • Learn how an attacker can steal a user’s sensitive data via a PDF
    • Discover how the attacker can launch an XSS attack via an image
    • Explore how the attacker can launch a user redirection attack via a link
    • Check if your web applications are vulnerable to these attacks
    • Learn from one of the top hackers at HackerOne
    • Become a successful penetration tester / ethical hacker

    Who is this for?


  • Penetration testers, ethical hackers, bug hunters, security engineers / consultants
  • More details


    Description

    User data is processed every single day by modern web applications. Think about PDFs, images, and links. They are everywhere. What’s more – they can be used to hack your web applications and obviously you don’t want that to happen.

    In this course you will learn how your web applications can be hacked via PDFs, images, and links. You will also learn how to check if your web applications are vulnerable to these attacks. First, I’ll show you how an attacker can steal a user’s sensitive data via a PDF. Next, I’ll present how the attacker can launch an XSS attack via an image. Finally, I’ll demonstrate how the attacker can launch a user redirection attack via a link (using window.opener tabnabbing).

    For every single attack there is a DEMO so that you can see, step-by-step, how these attacks work in practice. I hope this sounds good to you and I can’t wait to see you in the class.

    Note: you can get paid for these bugs in bug bounty programs.

    Who this course is for:

    • Penetration testers, ethical hackers, bug hunters, security engineers / consultants

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Dawid Czagan
    Dawid Czagan
    Instructor's Courses
    Dawid Czagan is listed among Top 10 Hackers (HackerOne). He has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter and other companies. Due to the severity of many bugs, he received numerous awards for his findings.Dawid Czagan shares his security bug hunting experience in his hands-on trainings “Hacking Web Applications – Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More” and “Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation”. He delivered security training courses at key industry conferences such as Hack In The Box (Amsterdam), CanSecWest (Vancouver), 44CON (London), Hack In Paris (Paris), DeepSec (Vienna), HITB GSEC (Singapore), BruCON (Ghent) and for many corporate clients. His students include security specialists from Oracle, Adobe, ESET, ING, Red Hat, Trend Micro, Philips and government sector.Dawid Czagan is a founder and CEO at Silesia Security Lab – a company which delivers specialized security testing and training services. To find out about the latest in Dawid Czagan’s work, you are invited to follow him on Twitter.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 7
    • duration 51:08
    • Release Date 2023/04/27