Discover additional attacks against web apps using weak or broken authentication methods and how cross-site scripting can be used to execute code.
Learning Objectives
Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2
- expose the dangers of broken and weak authentication methods and data leaking with poor or no encoding
- use cross-site scripting (XSS) to execute code and the dangers of using Indirect Object References (IDOR)
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Operations
- Cybersecurity Management
- Exploitation Analysis
- Threat Analysis
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.