Web App Hacking: Hacking Password Reset Functionality
Offered By: Pluralsight
Course Description
Overview
This course helps you understand different types of vulnerabilities in password reset functionality. You will learn how to test web applications for various flaws in password reset functionality and how to provide countermeasures for these problems.
Password reset functionality is very commonly implemented in modern web applications. In this course, Web App Hacking: Hacking Password Reset Functionality, you will learn that this sensitive functionality is often insecurely implemented and it can lead to very severe consequences. First, you will learn how password reset link can be disclosed over insecure channel and how it can leak to external domain via Referer header. Next, you will learn how the attacker can get unauthorized access to the account of arbitrary user as a result of Insecure Direct Object Reference in password reset functionality. You will also learn how the attacker can impersonate a user when session management is insecurely implemented at the time of password resetting. Finally, you will learn about weaknesses in lifecycle of password reset link and you will see how the attacker can enumerate users as a result of a weakness in password reset functionality. By the end of the course, you will know how to test web applications for various flaws in password reset functionality. What's more, you will learn how to implement this functionality securely.
Password reset functionality is very commonly implemented in modern web applications. In this course, Web App Hacking: Hacking Password Reset Functionality, you will learn that this sensitive functionality is often insecurely implemented and it can lead to very severe consequences. First, you will learn how password reset link can be disclosed over insecure channel and how it can leak to external domain via Referer header. Next, you will learn how the attacker can get unauthorized access to the account of arbitrary user as a result of Insecure Direct Object Reference in password reset functionality. You will also learn how the attacker can impersonate a user when session management is insecurely implemented at the time of password resetting. Finally, you will learn about weaknesses in lifecycle of password reset link and you will see how the attacker can enumerate users as a result of a weakness in password reset functionality. By the end of the course, you will know how to test web applications for various flaws in password reset functionality. What's more, you will learn how to implement this functionality securely.
Syllabus
- Course Overview 1min
- Introduction 9mins
- Leakage of Password Reset Link 7mins
- Insecure Direct Object Reference 6mins
- Insecure Session Management 8mins
- Weaknesses in Lifecycle of Password Reset Link 7mins
- User Enumeration 4mins
- Summary 4mins
Taught by
Dawid Czagan
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX