Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson offers participants a lab and solution for a streamed sequel injection using the 1 = 1 attack which allows coders to view all the information in the table when a command is given.
Module 01 OWASP Top 10 A1 Injection
Module 02 OWASP Top 10 A2 Broken Authentication and Session Management
Module 03 OWASP Top 10 A3 Cross-site Scripting
Module 04 OWASP Top 10 A4 Insecure Direct Object Reference
Module 05 OWASP Top 10 A5 Security Misconfiguration
Module 06 OWASP Top 10 A6 Sensitive Data Exposure
Module 07 OWASP Top 10 A7 Missing Function Level Access Control
Module 08 OWASP Top 10 A8 Cross-site Request Forgery
Module 09 OWASP Top 10 A9 Using Components with Known Vulns
Module 10 OWASP Top 10 A10 Unvalidated Redirects and Forwards
Module 11 CWE SANS Top 25 Buffer Overflows
Module 12 CWE SANS Top 25 Insecure Interaction Between Components
Module 13 CWE SANS Top 25 Risky Resource Management
Module 14 CWE SANS Top 25 Porous Defenses