Exploit Public-Facing Application

This course covers the MITRE technique T1190: Exploit Public-Facing Application. This technique involves an adversary exploiting a vulnerability in a public-facing application to gain unauthorized access to a target network. Students will learn about the types of public-facing applications and common vulnerabilities that attackers may target.

Time
1 hour 35 minutes
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Content
Campaign Overview
15m

2.1Attack, Detect and Mitigate

20m

2.2Magic Hound Lab

1h
Course Description

This course will cover the technique:

T1190: Exploit Public-Facing Application, is used by threat actors to exploit vulnerabilities in public-facing applications to gain unauthorized access to targeted systems or networks. This technique involves identifying weaknesses in web applications or web servers and using them to inject malicious code or exploit vulnerabilities to gain unauthorized access.

Public-facing applications are software applications accessible to users over the internet, such as websites, online portals, or mobile applications. These applications are commonly used by organizations to provide services, support communication, and store sensitive data. However, they are also attractive targets for attackers seeking to exploit vulnerabilities in these applications to gain unauthorized access to sensitive information or cause disruption to services.

This course will also cover:

  • T1212 - Exploitation for Credential Access
  • T1059.001 - Command and Scripting Interpreter: PowerShell
  • T1505.003 - Server Software Component: Web Shell

Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.

Instructed By
Owen Dubiel

Owen Dubiel

Security Engineer

Instructor
Lucas Romano

Lucas Romano

Red Team Operator

Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Exploit Public-Facing Application Certificate of Completion