Getting Started with Command Injection
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Explore the dangerous world of Command Injection vulnerabilities in this 13-minute video tutorial. Learn how untrusted input can be exploited when passed into functions that execute it as code. Begin with a comprehensive primer on the topic, followed by an in-depth code review to understand vulnerable implementations. Gain hands-on experience through practical labs, applying the knowledge acquired. Suitable for cybersecurity enthusiasts and professionals looking to enhance their understanding of this critical security flaw and its potential impact on systems.
Syllabus
Intro
Primer
Code review
Labs
Outro
Taught by
The Cyber Mentor
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX