Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Input-related vulnerabilities are among the most critical issues out there, including SQL injections and command injections. This course will teach you how to test the dynamic pages of your target application.
During a web application penetration test, your task is to identify potential vulnerabilities that attackers could exploit, including vulnerabilities in inputs and dynamic pages. Those vulnerabilities are among the most critical ones since they allow for extracting sensitive information from the server and even executing code on the target. Burp Suite is one of the best tools on the market for testing input validation since it contains several tools to handle dynamic pages as well as several predefined payloads for the most common attacks. In this course, Input Validation Testing with Burp Suite, you’ll learn to discover input vulnerabilities using the Burp frameworks. First, you’ll explore how to find and exploit cross-site scripting vulnerabilities using Burp. Next, you’ll discover how to leverage HTTP misconfigurations to compromise a web server. Finally, you’ll learn to find and exploit SQL injections and command injection vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge of Burp Suite needed to find input vulnerabilities in a web application.
During a web application penetration test, your task is to identify potential vulnerabilities that attackers could exploit, including vulnerabilities in inputs and dynamic pages. Those vulnerabilities are among the most critical ones since they allow for extracting sensitive information from the server and even executing code on the target. Burp Suite is one of the best tools on the market for testing input validation since it contains several tools to handle dynamic pages as well as several predefined payloads for the most common attacks. In this course, Input Validation Testing with Burp Suite, you’ll learn to discover input vulnerabilities using the Burp frameworks. First, you’ll explore how to find and exploit cross-site scripting vulnerabilities using Burp. Next, you’ll discover how to leverage HTTP misconfigurations to compromise a web server. Finally, you’ll learn to find and exploit SQL injections and command injection vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge of Burp Suite needed to find input vulnerabilities in a web application.