Have you ever thought of hacking web applications for fun and profit? How about playing with authentic, award-winning security bugs identified in some of the greatest companies? If that sounds interesting, join this unique 100% hands-on [...]
  • QABBPTBHO-QA
  • Cena na vyžiadanie

Have you ever thought of hacking web applications for fun and profit? How about playing with authentic, award-winning security bugs identified in some of the greatest companies? If that sounds interesting, join this unique 100% hands-on training!I will discuss security bugs found in a number of bug bounty programs (including Google, Yahoo, Mozilla, Twitter and others). You will learn how bug hunters think and how to hunt for security bugs effectively.To be successful in bug hunting, you need to go beyond automated scanners. If you are not afraid of going into detail and diving into full-stack exploitation, then this 100% hands-on training is for you. There is a lab exercise for each attack presented in this training + students can take the complete lab environment home after the training session.Watch 3 exclusive videos (~1 hour) to feel the taste of this training:Exploiting Race ConditionsToken Hijacking via PDF File Bypassing Content Security Policy

  • REST API hacking
  • AngularJS-based application hacking
  • DOM-based exploitation
  • bypassing Content Security Policy
  • server-side request forgery
  • browser-dependent exploitation
  • DB truncation attack
  • NoSQL injection
  • type confusion vulnerability
  • exploiting race conditions
  • path-relative stylesheet import vulnerability
  • reflected file download vulnerability
  • hacking with wrappers
  • subdomain takeover
  • remote cookie tampering
  • non-standard XSS attacks
  • hijacking tokens via PDF
  • XML attacks
  • deserialization attacks
  • HTTP parameter pollution
  • bypassing XSS protection
  • hacking with polyglot
  • clickjacking attack
  • window.opener tabnabbing attack
  • RCE attacks
  • and more…

Mám záujem o vybraný QA kurz