Lessons:20Length:2.1 hours

For full access to all 20 lessons, including source files, subscribe with Elements.
- Overview
- Transcript
3.1 Injection Attacks and Defenses (Reflected, PHP, and JavaScript)
Injection attacks are the number one vulnerability found in web applications. In this lesson, I’ll demonstrate some of the many attack vectors that allow an attacker to inject data using JavaScript or PHP in a reflected XSS attack. I’ll also demonstrate the built-in protections that JavaScript and PHP have to guard against this, as well as mention JavaScript frameworks that have built-in protections.
Related Links
1.Introduction1 lesson, 00:40
1 lesson, 00:40
Free Lesson 1.1Introduction00:40
Free Lesson
1.1
Introduction
00:40
2.The WidgetCorp App4 lessons, 34:39
4 lessons, 34:39
Free Lesson 2.1Introducing the App10:09
Free Lesson
2.1
Introducing the App
10:09
2.2Data Modeling04:19
2.2
Data Modeling
04:19
2.3Development Environment Setup10:32
2.3
Development Environment Setup
10:32
2.4Configuration Defaults09:39
2.4
Configuration Defaults
09:39
3.OWASP Top Ten14 lessons, 1:31:43
14 lessons, 1:31:43
3.1Injection Attacks and Defenses (Reflected, PHP, and JavaScript)07:38
3.1
Injection Attacks and Defenses (Reflected, PHP, and JavaScript)
07:38
3.2Injection Attacks (Mail, File, and SQL)05:16
3.2
Injection Attacks (Mail, File, and SQL)
05:16
3.3Injection Defenses (File System, Mail)15:04
3.3
Injection Defenses (File System, Mail)
15:04
3.4MySQL Injection Defenses02:46
3.4
MySQL Injection Defenses
02:46
3.5Authentication09:50
3.5
Authentication
09:50
3.6Broken Authentication and Session Management04:08
3.6
Broken Authentication and Session Management
04:08
3.7Insecure Direct Access or Object Reference05:20
3.7
Insecure Direct Access or Object Reference
05:20
3.8Security Configuration12:18
3.8
Security Configuration
12:18
3.9Sensitive Data08:26
3.9
Sensitive Data
08:26
3.10Missing Function-Level Access Control02:13
3.10
Missing Function-Level Access Control
02:13
3.11Cross-Site Request Forgery04:48
3.11
Cross-Site Request Forgery
04:48
3.12Known Vulnerable Components03:43
3.12
Known Vulnerable Components
03:43
3.13Unvalidated Redirects03:04
3.13
Unvalidated Redirects
03:04
3.14Brute-Force Attacks07:09
3.14
Brute-Force Attacks
07:09
4.Conclusion1 lesson, 00:48
1 lesson, 00:48
4.1Conclusion00:48
4.1
Conclusion
00:48
Continue watching with Elements
Continue watching with Elements