Udemy

Platform

English

Language

Network & Security

Category

Hacking Web Applications via PDFs, Images, and Links

Learn How Your Web Applications Can Be Hacked via PDFs, Images, and Links

4.45 (101 reviews)

Students

1 hour

Content

Jun 2020

Last Update
Regular Price

SKILLSHARE
SkillShare
Unlimited access to 30 000 Premium SkillShare courses
30-DAY FREE TRIAL

What you will learn

Learn how an attacker can steal a user’s sensitive data via a PDF

Discover how the attacker can launch an XSS attack via an image

Explore how the attacker can launch a user redirection attack via a link

Check if your web applications are vulnerable to these attacks

Learn from one of the top hackers at HackerOne

Become a successful penetration tester / ethical hacker


Description

User data is processed every single day by modern web applications. Think about PDFs, images, and links. They are everywhere. What’s more – they can be used to hack your web applications and obviously you don’t want that to happen.

In this course you will learn how your web applications can be hacked via PDFs, images, and links. You will also learn how to check if your web applications are vulnerable to these attacks. First, I’ll show you how an attacker can steal a user’s sensitive data via a PDF. Next, I’ll present how the attacker can launch an XSS attack via an image. Finally, I’ll demonstrate how the attacker can launch a user redirection attack via a link (using window.opener tabnabbing).

For every single attack there is a DEMO so that you can see, step-by-step, how these attacks work in practice. I hope this sounds good to you and I can’t wait to see you in the class.

Note: you can get paid for these bugs in bug bounty programs.


Screenshots

Hacking Web Applications via PDFs, Images, and Links
Hacking Web Applications via PDFs, Images, and Links
Hacking Web Applications via PDFs, Images, and Links
Hacking Web Applications via PDFs, Images, and Links

Content

Introduction

Introduction

Token Hijacking via PDF – Part 1

Token Hijacking via PDF – Part 1

Token Hijacking via PDF – Part 2

Token Hijacking via PDF – Part 2

XSS via Image – Part 1

XSS via Image – Part 1

XSS via Image – Part 2

XSS via Image – Part 2

User Redirection via window.opener Tabnabbing – Part 1

User Redirection via window.opener Tabnabbing – Part 1

User Redirection via window.opener Tabnabbing – Part 2

User Redirection via window.opener Tabnabbing – Part 2


Reviews

k
krishnan16 May 2021

Great course and I am absolutely recommending this to my friends, learned a lot during this course. The concepts were very well explained with clear examples. The instructor also replied in a fast and clear way. Terrific course


3205543

Udemy ID

6/5/2020

Course created date

10/10/2020

Course Indexed date
Bot
Course Submitted by