OWASP Top 10 Vulnerabilities

1 Introduction to SQL Injection

 

MySQL Injection (Integer Based)

 

MySQL Injection (String Based)

 

Automatic SQL Injection using SQLmap

 

2 Broken Authentication & Session Management

Attacking the Doors

 

Understanding & Identifying Session Management Vulnerabilities

 

3 Cross-Site Scripting

Demystifying XSS like Never Before

4 Insecure Direct Object References

Insecure Direct Object Reference

5 Security Misconfiguration

Disastrous Security Misconfigurations

6 Sensitive Data Exposure

Sensitive Information Disclosure

7 Missing Functional Level Access Control

Missing Functional Level Access Control

8 Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery

9 Using Components with Known Vulnerabilities

Using Components with Known Vulnerabilities

10 Unvalidated Redirects and Forwards

Unvalidated Redirects and Forwards

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *