Description
Size: 741 MB
$3.00
In this course, it will be shown to you how hackers can bypass Content Security Policy (CSP) which is the most powerful defensive technology in modern web applications. Then during this course, it will also be demonstrated how web applications can be hacked via PDFs, images, and links. You will also learn how hackers can steal secrets from AngularJS applications, which are very popular these days. Before concluding the course, you will understand how to exploit race conditions in web applications and how serious the consequences of this attack can be.
At the end of this course, you would have gained knowledge about other powerful, full-stack attacks on modern web applications such as HTTP parameter pollution, subdomain takeover, and clickjacking. In this online training, we will show you a lot of demos because we want you to apply this knowledge in your own pentesting projects. You’ll learn step by step how all these attacks work and you’ll also learn how to check if your web applications are vulnerable to these attacks.
Size: 741 MB