1 00:00:00,147 --> 00:00:02,564 (soft tones) 2 00:00:07,730 --> 00:00:09,460 - Welcome to lesson six, 3 00:00:09,460 --> 00:00:12,390 Exploiting Application-based Vulnerabilities. 4 00:00:12,390 --> 00:00:15,170 In this lesson, we will start with an overview 5 00:00:15,170 --> 00:00:18,210 of web applications, and how to build your own 6 00:00:18,210 --> 00:00:19,970 web application lab. 7 00:00:19,970 --> 00:00:21,920 We will then go over how to exploit 8 00:00:21,920 --> 00:00:25,590 injection-based vulnerabilities, as well as authentication 9 00:00:25,590 --> 00:00:28,080 and authorization-based vulnerabilities. 10 00:00:28,080 --> 00:00:31,450 You will learn how to exploit cross-site scripting, 11 00:00:31,450 --> 00:00:33,729 cross-site request forgery vulnerabilities, 12 00:00:33,729 --> 00:00:37,090 and the concepts of clickjacking. 13 00:00:37,090 --> 00:00:41,740 You will learn how to exploit security misconfigurations, 14 00:00:41,740 --> 00:00:44,542 file inclusion vulnerabilities, and much more. 15 00:00:44,542 --> 00:00:46,400 At the end of this lesson, 16 00:00:46,400 --> 00:00:50,963 we will go over how to identify insecure code practices.