OWASP A7 and A6: Leaky and Unprepared Applications


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
OWASP Top 10 list items 7 and 6 involve applications that expose sensitive data and are not protected from modern attacks.

Target Audience
Individuals who wish to increase their knowledge in the field of web application security and common exploits used against web applications

Prerequisites
None

Expected Duration (hours)
1.1

Lesson Objectives

OWASP A7 and A6: Leaky and Unprepared Applications

  • start the course
  • describe what insufficient attack protection is
  • exploit insufficient attack protection and what kind of access is needed to exploit it
  • use nmap to scan a network
  • detect insufficient attack protection and note how common it is
  • use online web app scanners
  • describe the client/server HTTP exchange
  • analyze Linux log rotation files for a Linux web server
  • list the technical and business impacts of insufficient attack protection
  • discuss attacks that take advantage of insufficient attack protection
  • describe what sensitive data exposure is
  • analyze sensitive network traffic in Linux
  • describe how sensitive data exposure can be exploited
  • review how sensitive data exposure can be exploited and what kind of access is needed to exploit it
  • describe how easy it is to detect sensitive data exposure and how common it is
  • list the technical and business impacts of sensitive data exposure
  • describe how various attacks can result in sensitive data exposure
  • provide examples of sensitive data exposure attacks
  • describe the impact of these exploits on the business and technical sides
  • Course Number:
    sp_owtt_a04_it_enus

    Expertise Level
    Intermediate