Injection Attack Bypassing Authentication | Using Burp to Test for the OWASP Top Ten | Burp suite
2
Using Burp to Detect Blind SQL Injection Bugs | Burp to Test for the OWASP Top Ten | Burp suite
3
Using Burp to Detect SQL specific Parameter Manipulation Flaws | Burp suite
4
Using Burp to Exploit Bind SQL Injection Bugs | OWASP Top Ten | Burp suite
5
Using Burp to Exploit SQL Injection Vulnerabilities The UNION Operator | OWASP Top Ten | Burp suite
6
Using Burp to Test For Injection Flaws | Using Burp to Test for the OWASP Top Ten | Burp suite
7
Using Burp Scanner to Find Cross Site Scripting Issues | OWASP Top Ten | Burp suite
8
Using Burp to Manually Test for Reflected XSS| Using Burp to Test for the OWASP Top Ten | Burp suite
9
Using Burp to Manually Test for Stored XSS | Using Burp to Test for the OWASP Top Ten | Burp suite
10
Using Burp to Exploit XSS Injecting in to Direct HTML | OWASP Top Ten | Burp suite
11
Using Burp to Exploit XSS Injecting in to Tag Attributes | OWASP Top Ten | Burp suite
12
Using Burp to Exploit XSS Injecting in to Scriptable Contexts | OWASP Top Ten | Burp suite
Description:
Learn how to utilize Burp Suite for testing against the OWASP Top Ten vulnerabilities in this 30-minute tutorial. Explore techniques for detecting and exploiting various security flaws, including injection attacks, authentication bypasses, SQL injection, cross-site scripting (XSS), and parameter manipulation. Gain hands-on experience with Burp Scanner and manual testing methods to identify and exploit vulnerabilities in web applications, enhancing your web security testing skills.