Part 1 Intro

Video Activity

This lesson gives the agenda for the corresponding module: • Definition, Sample Code and Case study • Demos: Insecure configuration (directory traversal), insecure XML Parser settings (XXE injections) and user agent header manipulation • Mitigations, countermeasures and defenses • Lab and Lab solution

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
9 hours 31 minutes
Difficulty
Intermediate
CEU/CPE
10
Video Description

This lesson gives the agenda for the corresponding module: • Definition, Sample Code and Case study • Demos: Insecure configuration (directory traversal), insecure XML Parser settings (XXE injections) and user agent header manipulation • Mitigations, countermeasures and defenses • Lab and Lab solution

Video Transcription
00:04
Hello and welcome to the cyber very secure coding course.
00:08
My name is Sonny Wear, and this is a loss Top 10 for 2013
00:14
a five security Miss configuration. Now we're first going to go through our loss definition
00:22
and also take a look at some sample attacks. And, of course, our case study.
00:28
Following that, we're gonna look at three demos.
00:31
We have got our insecure configuration demo, which is going to show a directory to oversell attack.
00:40
Then we have our insecure XML parcels setting
00:44
demo that's going to show an *** e injection attack.
00:49
And then finally, we're going to show how user agent header information can be manipulated
00:57
And how you don't want to rely on this for your security decisions and so it can lead to a security miss configuration in your code.
01:08
Then we're gonna go into are mitigations countermeasures in defenses. And then we'll wrap up our module with our lab in the lab solution
Up Next