Welcome back to the course, but now it's time to say we are done
after the last video that we talked about. All this also flogs like i ps ideas
in my application. Faro.
In this video, we'll d'oh! Of course summary.
This was a basically course.
The Miami Jai off this course waas Each of those log analysis
This is today the where applications are present in our lives. It waas a good way to start til organizes.
This course was builds thinking on
bro. Teamers are the fenders
and also this off analysts.
Let's see a brief review off the course stocks.
We had two modules in our course. The first was the introduction in a review.
We started with the course introduction, followed by a Web application review.
Where we talked about were replication components like Webb seven in clients.
After we talked about a really important component, the Web seven.
We talked about Apache and Jax, and I s
also in this lesson. We talked about Web several logs
and you conclude the module on. We give some advice is about Hutch perform a good analysis, and also some will organize his mistakes. Errors
the mother too, were the model to the Logan dances.
The first stop off the mortar Jew
WAAS Web application attacks, which cost about durability attacks and over I stopped in project.
In this course, we use a desperation 2017 off the watch stopped in project.
The important thing here is even if they watch stopped in large a new version they formation about these attacks will not change.
Some vulnerability in attacks became less popular
a new type of attacks could be found.
That's why is important to understand the Web. Several logs.
After this introduction, we started talking about the attacks
without abilities Canes,
brute force attacks,
a scare injection file inclusion Gross. I'd scream teen
cross eyed request forgery
for each of these attacks. We gave some directions. How do they find them?
For example, Use their agent in hell payloads.
But don't forget that, http Requests can be corrected.
Remember to understand what the law means, What the law I want to say to you. Remember the questions who, what and when?
Look for key components off the love like the I P address. And don't worry if you do not understand
all the luck, feuds.
Logan has the skills improve with practice. See
more Logan, as you do, better you be.
And after all these attacks, in log analogies, we talked about recipe and http flowed and we discussed it. How did they find them?
And to finish the course, we talked about it. You're really important to that. Helps some analysts
i p s or R G s and the Web application fire. Oh,
to finish some final words.
Many people happened me during this course,
but I would like to do a special mention
23 teaching assistant that assisted me with this course.
Jenna, Harvey and Stephen.
Thanks, guys. I really appreciate all the help.
Final things. So all the cyber, the stash.
And now thanks for watching this course. I really enjoyed the time there has been doing this course.
I hope that you like this course as much as I enjoy doing it
and also hope that this course improve your knowledge and motivated you to keep learning
to keep learning. Check cyber catalog. There are many great courses on it.
And if you have any questions, suggestions or doubts, feel free to contact me.
I think so. And see you on the next course.