Загрузка страницы

Cross-Origin Resource Sharing (CORS) | Complete Guide

In this video, we cover the theory behind Cross-Origin Resource Sharing (CORS) vulnerabilities, how to find these types of vulnerabilities from both a white box and black box perspective, how to exploit them and how to prevent them.

▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬
Buy my course: https://bit.ly/30LWAtE

▬ 📖 Contents of this video 📖 ▬▬▬▬▬▬▬▬▬▬
00:00 - Introduction
00:31 - Web Security Academy Course (https://bit.ly/30LWAtE)
01:42 - Agenda
02:30 – What is a CORS vulnerability?
33:35 – How to find CORS vulnerabilities?
42:37 – How to exploit CORS vulnerabilities?
50:25 – How to prevent CORS vulnerabilities?
51:47 – Resources
52:00 - Thank You

▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Video slides: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/cors/theory/CORS%20Complete%20Guide%20Theory%20Video%20Slides.pdf
Web Security Academy: https://portswigger.net/web-security/cors
Rana's Twitter account: https://twitter.com/rana__khalil
Hacker Icons made by Freepik: https://www.freepik.com

Видео Cross-Origin Resource Sharing (CORS) | Complete Guide канала Rana Khalil
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
13 марта 2022 г. 22:00:37
00:52:17
Другие видео канала
Business Logic Vulnerabilities - Lab #2 High-level logic vulnerability | Long VersionBusiness Logic Vulnerabilities - Lab #2 High-level logic vulnerability | Long VersionAuthentication Vulnerabilities - Lab #9 Brute-forcing a stay-logged-in cookie | Short VersionAuthentication Vulnerabilities - Lab #9 Brute-forcing a stay-logged-in cookie | Short VersionBusiness Logic Vulnerabilities - Lab #1 Excessive trust in client-side controls | Long VersionBusiness Logic Vulnerabilities - Lab #1 Excessive trust in client-side controls | Long VersionAuthentication Vulnerabilities - Lab #12 Password brute-force via password change | Short VersionAuthentication Vulnerabilities - Lab #12 Password brute-force via password change | Short VersionAuthentication Vulnerabilities - Lab #6 Broken brute-force protection, IP block | Short VersionAuthentication Vulnerabilities - Lab #6 Broken brute-force protection, IP block | Short VersionSQL Injection - Lab #7 SQL injection attack, querying the database type and version on OracleSQL Injection - Lab #7 SQL injection attack, querying the database type and version on OracleBusiness Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Long VersionBusiness Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Long VersionAuthentication Vulnerabilities - Lab #8 2FA broken logic | Short VersionAuthentication Vulnerabilities - Lab #8 2FA broken logic | Short VersionBusiness Logic Vulnerabilities - Lab #5 Low Level Logic Flaw | Short VideoBusiness Logic Vulnerabilities - Lab #5 Low Level Logic Flaw | Short VideoBusiness Logic Vulnerabilities - Lab #6 Inconsistent handling of exceptional input | Short VideoBusiness Logic Vulnerabilities - Lab #6 Inconsistent handling of exceptional input | Short VideoBusiness Logic Vulnerabilities - Lab #4 Flawed enforcement of business rule | Short VersionBusiness Logic Vulnerabilities - Lab #4 Flawed enforcement of business rule | Short VersionBusiness Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Short VersionBusiness Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Short VersionCommand Injection - Lab #3 Blind OS command injection with output redirection | Long VersionCommand Injection - Lab #3 Blind OS command injection with output redirection | Long VersionSQL Injection - Lab #15  Blind SQL injection with out-of-band interactionSQL Injection - Lab #15 Blind SQL injection with out-of-band interactionDirectory Traversal - Lab #5 File path traversal, validation of start of path | Long VersionDirectory Traversal - Lab #5 File path traversal, validation of start of path | Long VersionCORS - Lab #4 CORS vulnerability with internal network pivot attack | Long VideoCORS - Lab #4 CORS vulnerability with internal network pivot attack | Long VideoBusiness Logic Vulnerabilities - Lab #3 Inconsistent security controls | Long VersionBusiness Logic Vulnerabilities - Lab #3 Inconsistent security controls | Long VersionBroken Access Control - Lab #12 Multi-step process with no access control on one step | Long VersionBroken Access Control - Lab #12 Multi-step process with no access control on one step | Long VersionBroken Access Control - Lab #2 Unprotected admin functionality with unpredictable URL | Long VersionBroken Access Control - Lab #2 Unprotected admin functionality with unpredictable URL | Long VersionAuthentication Vulnerabilities - Lab #9 Brute-forcing a stay-logged-in cookie | Long VersionAuthentication Vulnerabilities - Lab #9 Brute-forcing a stay-logged-in cookie | Long VersionAuthentication Vulnerabilities - Lab #5 Username enumeration via response timing | Long VersionAuthentication Vulnerabilities - Lab #5 Username enumeration via response timing | Long Version
Яндекс.Метрика