Home
:
Book details
:
Book description
Description of
Authentication Flaws Mastery HandsOn From Zero To Hero
Published 4/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 1.08 GB | Duration: 1h 34m Become professional in finding and exploiting Authentication Vulnerabilities. For Ethical Hackers and Bug Hunters What you'll learn authentication vulnerabilities 2FA vulnerabilities bypassing authentication find and exploit authentication vulnerabilities penetration testing bug bounty hunting Walkthrough of all Broken Access Control Apprentice and Practitioner Labs from Portswigger Requirements Basic IT Skills Basic understanding of web technology No Linux, programming or hacking knowledge required Computer with a minimum of 4GB ram/memory Operating System: Windows / Apple Mac OS / Linux Reliable internet connection Burp Suite Community (Pro optional) Firefox Web Browser Description Overview Section 1: Introduction Lecture 1 Introduction Section 2: Authentication Vulnerabilities Theory Lecture 2 Authentication Vulnerabilities Theory Section 3: Authentication Vulnerabilities Labs Lecture 3 Username enumeration via different responses Lecture 4 2FA simple bypass Lecture 6 Username enumeration via subtly different responses Lecture 7 Username enumeration via response timing Lecture 8 Broken brute-force protection IP block Lecture 9 Username enumeration via account lock Lecture 10 2FA broken logic Lecture 11 Brute-forcing a stay-logged-in cookie