Главная
Study mode:
on
1
Intro
2
About David
3
What is OWASP
4
Components with known vulnerabilities
5
Misconfigurations
6
Sensitive Data Exposure
7
View Source
8
Post vs Get
9
Broken Authentication Session Management
10
Insecure Direct Object References
11
Path Manipulation
12
Access Control
13
False Change
14
Crosssite request forgery
15
Crosssite scripting
16
Utility
17
Security
18
View Page Source
19
Image Source
20
XSS
21
Cookies
22
Browser Exploit Tools
23
Multiple Submission Web Forms
24
Web Pen Testing
25
Form Submission
26
Expose
27
Burp Suite
28
Ajax
29
Darkness
30
Injection
31
Error Messages
32
Training Tool
33
Magic Strings
34
Single Quote Space
35
Fail
36
Missing Space
37
Adding Space
38
Database Cleanup
39
Sequel Map
40
Run as root
41
Command shell stored procedures
Description:
Explore OWASP Top 10 vulnerabilities and learn practical exploitation techniques in this comprehensive BSides Augusta 2015 conference talk. Dive into topics such as components with known vulnerabilities, misconfigurations, sensitive data exposure, broken authentication, and session management. Discover how to identify and exploit insecure direct object references, path manipulation, and access control issues. Gain insights into cross-site request forgery, cross-site scripting, and various browser exploit tools. Learn about web penetration testing methodologies, including form submission analysis, Burp Suite usage, and Ajax manipulation. Investigate injection techniques, error message analysis, and database-related vulnerabilities. Master the art of crafting magic strings and understand the importance of proper input sanitization. Conclude with an exploration of command shell stored procedures and the risks of running applications as root.

Attacking OWASP - Exploiting the Top 10

Add to list
00:00
-00:51