05
Software Vulnerabilities
Web Application Penetration - 1:
- Intro to software & web application PT
Web Application Penetration - 2:
- Web application recon & information gathering
Web Application Penetration - 3:
Web application attacks:
- Authentication & authorization
- Code injection
Web Application Penetration - 4:
Web application attacks:
- Code injection
Web Application Penetration - 5:
Web application attacks:
- Social engineering
- Advanced attack vectors
Memory currptions:
- Reverse engineering basics
- Buffer overflow