OWASP A4 and A2: Broken Applications
Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
OWASP Top 10 list items 4 and 2 involve applications with broken access controls and broken authentication and session management.
Target Audience
Individuals who wish to increase their knowledge in the field of web application security and common exploits used against web applications
Prerequisites
None
Expected Duration (hours)
1.2
Lesson Objectives OWASP A4 and A2: Broken Applications
start the course
explain what Broken Access Control is
how Broken Access Control can be exploited and what kind of access is needed to exploit it
how easy it is to detect Broken Access Control and how common they are
the technical and business impacts of Broken Access Control
provide examples of Broken Access Control attacks
guess URLs and parameters to gain access to web pages and data
explain what Broken Authentication and Session Management is
how Broken Authentication and Session Management can be exploited and what kind of access is needed to exploit it
how easy it is to detect Broken Authentication and Session Management and how common they are
the technical and business impacts of Broken Authentication and Session Management
provide examples of Broken Authentication and Session Management attacks
retrieve sensitive data through password reset pages
what an attacker can access if they exploit A4 or A2
Course Number: sp_owtt_a05_it_enus
Expertise Level
Intermediate