From the course: CompTIA PenTest+ (PT0-003) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Application exploits, part 2
From the course: CompTIA PenTest+ (PT0-003) Cert Prep
Application exploits, part 2
- Always remember that if you want to attack application, there's lots of different ways that you can do it. Don't just focus on the first type of attack that you see or learn about. Make sure that you explore all the different ways because applications are always going to have higher authority than just attacking from the outside. In other words, they're normally connected to some sort of database and they have data access already baked in to the application. So let's look at some more types of application exploits. Authentication is a rich area to attack, or at least exploits centered around authentication. We can look at credential brute forcing, which we've already talked about a little bit earlier. Remember we talked about Hydra. How about offline cracking? We can use offline cracking, online cracking, where we basically want to try to find a credential that allows us to log into an application and operate as an…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Application exploits, part 15m 23s
-
SQL injection demo8m 32s
-
(Locked)
Labtainers lab (SQL injection)2m 39s
-
(Locked)
Application exploits, part 27m 57s
-
(Locked)
Application exploits, part 38m 56s
-
(Locked)
Cross-site scripting demo6m 54s
-
(Locked)
Labtainers lab (cross-site scripting)1m 42s
-
(Locked)
Labtainers lab (cross-site request forgery)1m 20s
-
(Locked)
API attacks and attack resources6m 18s
-
(Locked)
Privilege escalation (Linux)9m 31s
-
(Locked)
Privilege escalation (Windows)6m 1s
-
(Locked)
Privilege escalation: Miscellaneous7m 49s
-
(Locked)
Local host vulnerabilities: Miscellaneous8m
-
(Locked)
Additional local host vulnerabilities2m 54s
-
(Locked)
-
-
-
-
-
-
-