Exploit Public-Facing Application
This course covers the MITRE technique T1190: Exploit Public-Facing Application. This technique involves an adversary exploiting a vulnerability in a public-facing application to gain unauthorized access to a target network. Students will learn about the types of public-facing applications and common vulnerabilities that attackers may target.
Already have an account? Sign In »

Module 1: Introduction
Module 2: What is Technique T1190?
2.1Attack, Detect and Mitigate
2.2Magic Hound Lab
This course will cover the technique:
T1190: Exploit Public-Facing Application, is used by threat actors to exploit vulnerabilities in public-facing applications to gain unauthorized access to targeted systems or networks. This technique involves identifying weaknesses in web applications or web servers and using them to inject malicious code or exploit vulnerabilities to gain unauthorized access.
Public-facing applications are software applications accessible to users over the internet, such as websites, online portals, or mobile applications. These applications are commonly used by organizations to provide services, support communication, and store sensitive data. However, they are also attractive targets for attackers seeking to exploit vulnerabilities in these applications to gain unauthorized access to sensitive information or cause disruption to services.
This course will also cover:
- T1212 - Exploitation for Credential Access
- T1059.001 - Command and Scripting Interpreter: PowerShell
- T1505.003 - Server Software Component: Web Shell
Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.

Owen Dubiel
Security Engineer

Lucas Romano
Red Team Operator


Complete this entire course to earn a Exploit Public-Facing Application Certificate of Completion