Companies Home Search Profile

OWASP TOP 10: Information disclosure ~2023

Focused View

Foyzul Islam

1:03:58

90 View
  • 1 - Introduction.html
  • 2 - Lab 1.mp4
    13:05
  • 3 - Lab 2.mp4
    09:19
  • 4 - Lab 3.mp4
    08:57
  • 5 - Lab 4.mp4
    11:53
  • 6 - Lab 5.mp4
    10:54
  • 7 - Burp Suite.mp4
    07:08
  • 8 - Its me.mp4
    02:42
  • Description


    The Complete Information disclosure vulnerabilities Course| Learn with Fun way

    What You'll Learn?


    • OWASP Top 10
    • Authentication bypass via information disclosure
    • Revealing the names of hidden directories, their structure, and their contents
    • Hard-coding API keys, IP addresses, database credentials, and so on in the source code
    • Providing access to source code files via temporary backups
    • Unnecessarily exposing highly sensitive information, such as credit card details
    • Hinting at the existence or absence of resources, usernames, and so on via subtle differences in application behavior

    Who is this for?


  • How Wants to be Bug Bounty Hunter
  • How wants to practice OWASP Top 10
  • How Loves Web Application penetration testing
  • Who wants to be master about Information disclosure vulnerabilities
  • More details


    Description

    Information disclosure, also known as information leakage, is when a website unintentionally reveals sensitive information to its users.  As Simple, Information disclosure is when a web application fails to properly protect confidential information, which causes revealing sensitive information or data of the users or anything related to users to any third party.

    Exploits a web site that reveals sensitive data, such as developer comments or error messages. Path Traversal. Forces access to files, directories, and commands that are located outside the web document root directory.

    CISA Coordinated Vulnerability Disclosure (CVD) Process. CISA's CVD program coordinates the remediation and public disclosure of newly identified cybersecurity vulnerabilities in products and services with the affected vendor(s).



    The OWASP Top 10 provides rankings of—and remediation guidance for—the top 10 most critical web application security risks. Leveraging the extensive knowledge and experience of the OWASP's open community contributors, the report is based on a consensus among security experts from around the world and It is the most prevalent and impactful vulnerability as per the OWASP “Top 10” list.


    What is vulnerability disclosure in cyber security?

    This Vulnerability Disclosure Policy (VDP) describes the activities that can be undertaken by security researchers to find and report vulnerabilities in internet-accessible systems and services in a legally authorized manner.



    Why need to learn Information disclosure vulnerabilities?

    Learning to find and exploit information disclosure is a vital skill for any tester. You are likely to encounter it on a regular basis and, once you know how to exploit it effectively, it can help you to improve your testing efficiency and enable you to find additional, high-severity bugs.

    VDPs provide the framework and guidance that enables this. Once a security vulnerability has been disclosed, it can provide organisations with the information required to shape appropriate mitigation steps and decrease the chance of exploitation of the security vulnerability by adversaries.


    Types of Information disclosure vulnerabilities

                >>Directory Indexing

                >>Information Leakage

                >>Path Traversal

                >>Predictable Resource Location



    How to prevent Information disclosure

    • Bad configuration

    • using a poorly designed application

    • Fails to remove sensitive content from public content

    Who this course is for:

    • How Wants to be Bug Bounty Hunter
    • How wants to practice OWASP Top 10
    • How Loves Web Application penetration testing
    • Who wants to be master about Information disclosure vulnerabilities

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Foyzul Islam
    Foyzul Islam
    Instructor's Courses
    My name is Paplu Ahmed, I am an Ethical Hacker, Programmer and CTF Lover. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker.Paplu Ahmed is a Penetration Tester with over 4 years of experience in Ethical Hacking and Problem Solving. He started learning hacking and programming on his own from a young age. Now he is working successfully on popular sites like HackerOne, bugCrowed, ctftime, hackerrank, codeforces.As a tutor, he joined Udemy, the world's largest online learning platform, in 2023. He joined as an instructor to spread his experience and skills among the people. Prior to this, he has been teaching offline for more than 1.5 year
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 7
    • duration 1:03:58
    • Release Date 2023/03/15

    Courses related to Cyber Security