Module 01 – OWASP TOP 10 – 2017
- Workbook (Pdf)
- Overview
- A1 Injection: Exploit
- A1 Injection: Mitigate
- A1 Injection: Breakdown
- A2 Broken Auth: Exploit
- A2 Broken Auth: Mitigate
- A2 Broken Auth: Breakdown
- A3 Sensitive Data Exposure: Exploit
- A3 Sensitive Data Exposure: Mitigate
- A3 Sensitive Data Exposure: Breakdown
- A4 XML External Entities: Exploit
- A4 XML External Entities: Mitigate
- A4 XML External Entities: Breakdown
- A5 Broken Access Control: Exploit
- A5 Broken Access Control: Mitigate
- A5 Broken Access Control: Breakdown
- A6 Security Misconfiguration: Exploit
- A6 Security Misconfiguration: Mitigate
- A6 Security Misconfiguration: Breakdown
- A7 Cross-Site Scripting (XSS): Exploit
- A7 Cross-Site Scripting (XSS): Mitigate
- A7 Cross-Site Scripting: Breakdown
- A8 Insecure Deserialization: Exploit
- A8 Insecure Deserialization: Mitigate
- A8 Insecure Deserialization: Breakdown
- A9 Components W/ Known Vulnerabilities: Exploit
- A9 Components W/ Known Vulnerabilities: Mitigate
- A9 Using Components Known Vulnerability Breakdown
- A10 Insufficient Logging And Monitoring
- Review Quiz (Number of attempts allowed: Unlimited)