Hacking Web Applications via PDFs, Images, and Links
Dawid Czagan
51:08
Description
Learn How Your Web Applications Can Be Hacked via PDFs, Images, and Links
What You'll Learn?
- Learn how an attacker can steal a user’s sensitive data via a PDF
- Discover how the attacker can launch an XSS attack via an image
- Explore how the attacker can launch a user redirection attack via a link
- Check if your web applications are vulnerable to these attacks
- Learn from one of the top hackers at HackerOne
- Become a successful penetration tester / ethical hacker
Who is this for?
More details
DescriptionUser data is processed every single day by modern web applications. Think about PDFs, images, and links. They are everywhere. Whatâs more â they can be used to hack your web applications and obviously you donât want that to happen.
In this course you will learn how your web applications can be hacked via PDFs, images, and links. You will also learn how to check if your web applications are vulnerable to these attacks. First, Iâll show you how an attacker can steal a userâs sensitive data via a PDF. Next, Iâll present how the attacker can launch an XSS attack via an image. Finally, Iâll demonstrate how the attacker can launch a user redirection attack via a link (using window.opener tabnabbing).
For every single attack there is a DEMO so that you can see, step-by-step, how these attacks work in practice. I hope this sounds good to you and I canât wait to see you in the class.
Note: you can get paid for these bugs in bug bounty programs.
Who this course is for:
- Penetration testers, ethical hackers, bug hunters, security engineers / consultants
User data is processed every single day by modern web applications. Think about PDFs, images, and links. They are everywhere. Whatâs more â they can be used to hack your web applications and obviously you donât want that to happen.
In this course you will learn how your web applications can be hacked via PDFs, images, and links. You will also learn how to check if your web applications are vulnerable to these attacks. First, Iâll show you how an attacker can steal a userâs sensitive data via a PDF. Next, Iâll present how the attacker can launch an XSS attack via an image. Finally, Iâll demonstrate how the attacker can launch a user redirection attack via a link (using window.opener tabnabbing).
For every single attack there is a DEMO so that you can see, step-by-step, how these attacks work in practice. I hope this sounds good to you and I canât wait to see you in the class.
Note: you can get paid for these bugs in bug bounty programs.
Who this course is for:
- Penetration testers, ethical hackers, bug hunters, security engineers / consultants
User Reviews
Rating
Dawid Czagan
Instructor's Courses
Udemy
View courses Udemy- language english
- Training sessions 7
- duration 51:08
- Release Date 2023/04/27