Injection Attacks: The Free 2020 Guide

Description: In this course, we explore the biggest risk facing web applications: injections. While we will focus primarily on SQL injections, there are other types of injections such as OS command, LDAP, XPATH, XML, and SMTP header injections, which are all listed in the OWASP Top 10 risks. In order to truly understand how injections work, we have to learn hands-on by executing attacks against vulnerable applications, and that's exactly what we'll do in this course. We start out by setting up safe and legal environments, and then we go on the offense exploring each successful and unsuccessful attack to understand what's going on, and ultimately, how to protect our apps against such vulnerabilities. So if you're looking for hands-on learning, this is your course!

Duration: ~4 hours

Difficulty: Beginner to Intermediate

Recommended pre-requisites:

Topics Covered:

  • Explore the power of injections as listed by OWASP in their top 10 risks (including SQL injections)
  • Follow along as we attack applications legally & safely
  • Learn defense controls against injections
Christophe · June 26, 2020