웹 개발자와 정보보안 입문자가 꼭 알아야 할 웹 해킹 & 시큐어 코딩
크리핵티브
정보보안 입문자와 웹 개발자 분들을 위한 웹 해킹 입문 강의! 본 강의를 시작으로 웹 해킹을 재미있게 시작해보세요!
Basic
모의해킹, 인젝션
This lecture covers the king of client attacks, XSS (Cross-Site Scripting). You can systematically learn about the basic concepts of XSS, the attack principles, and most importantly, what process to go through to perform the attack procedure.
Concept of XSS attack
XSS attack principle
Types of XSS attacks
XSS attack methodology
Master XSS attacks in one lecture!
Learn systematically with security practitioners.
XSS stands for Cross-Site Scripting
Abbreviation for (cross-site scripting),
Through malicious scripts inserted into web pages
This is a vulnerability that occurs when sites are crossed.
XSS is a vulnerability that occurs when cross-site scripting occurs via client-side scripting . Ransomware infections, which have recently become a major issue, are also often distributed and infected through XSS.
Furthermore, as web attacks shift from the server-side to the client-side, vulnerabilities are increasingly being discovered in web applications. Consequently, the importance and interest in XSS attacks are on the rise.
I can confidently say that there will never be another type of education like this!
Most web hacking training and books only cover the basic concepts of attacks.
However, this lecture will allow you to learn more systematically about basic concepts, attack principles, and most importantly, 'what process should be used to carry out the attack procedure' .
Section 1. Understanding XSS Attacks
Learn the basic concepts and principles of XSS attacks . We'll also examine what XSS attacks can do, how they're used in practice, and their limitations.
To ensure a smooth XSS attack, we'll explore JavaScript, the programming language used in these attacks. Rather than delving into the specifics of JavaScript, we'll focus on the fundamental concepts behind XSS attacks.
We will look at the concepts and principles of DOM-Based XSS, Reflected XSS, and Stored XSS, which are XSS attack techniques, and learn in detail about the differences that lead to the classification of these attack techniques.
After studying this section, you'll be able to accurately distinguish and judge the XSS attack techniques described above. This will be particularly helpful for those who struggle to distinguish between Dom-Based XSS and Reflected XSS attacks .
Please check the lecture for more details!
This section is the core of this lecture, covering attack methodologies not found in existing books or training courses. To successfully launch an attack, you need to understand how to approach it and how to deploy it in specific situations and environments .
Plus, you'll learn some must-know tips when attacking.
We'll explore various methods for bypassing XSS attacks based on their validation logic. While XSS attacks typically have numerous bypass techniques, this section will focus on techniques commonly used in practice.
Let's examine session hijacking , a type of attack that can be perpetrated via XSS. We'll cover the concept, attack principles, and practical attack practice of session hijacking.
Let's examine keylogging , a type of attack that can be perpetrated via XSS. We'll explore the concept of keylogging, its principles, and practical attack practice.
In this section, we will look at several things to keep in mind when conducting practical diagnostics, which are also mistakes that many diagnosticians make when diagnosing vulnerabilities.
Please check the lecture for more details!
To be considered a true information security expert, you must know not only attacks but also countermeasures .
The final section explores secure coding practices and the use of security libraries to defend against XSS attacks. We also explore methods for defending against session hijacking attacks.
Q. Is there anything I should know before taking the course?
Knowledge of web fundamentals is helpful. I recommend taking the following lectures first:
Web Technology Fundamentals You Must Know
Essential knowledge on HTTP, WWW, cookies/sessions, etc. all at once.
Q. I am a non-major or student with no information security knowledge. Can I still take this course?
As mentioned above, if you take the web fundamentals course, you'll be able to take the course without difficulty. Furthermore, some programming knowledge can be a significant help in your learning.
Q. What is the difference between the XSS attack content covered in the "Web Hacking, Security, and Secure Coding: Essential Knowledge for Web Developers and Information Security Beginners" course and this course?
While the lecture you mentioned also covers XSS-related topics, you'll learn at a level comparable to what's covered in existing training or books. This course will delve into the methodology and processes for diagnosing attacks.
Web Hacking, Security, and Secure Coding
If you want to start having fun with web hacking!
Q. Can information security practitioners also attend?
Of course. It will actually be more helpful. I believe my previous lectures have already proven this point. ^^
※ This training PPT uses Nanum font provided by Naver.
Who is this course right for?
Information Security Beginner
Information Security Expert
Web Developer
Need to know before starting?
Web Basics
Programming Basics
25,880
Learners
1,361
Reviews
497
Answers
4.9
Rating
18
Courses
:: 국내 정보보안 솔루션 개발 기업 재직 ::
- 앱 위변조 방지 솔루션 : 미들웨어 담당 / 해킹 대회 운영진 / 국내 유명 해킹/방어 훈련장 제작
:: 국내 정보보안 전문 업체 재직 ::
- 블랙박스 모의해킹 / 시나리오 기반 모의해킹 / 웹 취약점 진단 / 모바일 취약점 진단 / 소스코드 취약점 진단 / APT 모의 훈련 / DDoS 모의훈련 / 인프라 진단 / 스마트 가전 진단
- 국내 대기업, 중소기업 다수 진단
:: 외부 교육 및 활동 ::
- 멀티캠퍼스, 국가 보안 기술 연구소(ETRI)
- 국내 정보보안 업체 : 재직자 대상 "웹 모의해킹 심화 교육" 진행중
- 해커팩토리 문제 제작
:: 취약점 발견 ::
1) Web Application Server 취약점
- TMAX JEUS : 원격 명령어 실행 취약점(Remote Command Execution Vulnerability)
- IBM WebSphere(CVE-2020-4163) : 원격 명령어 실행 취약점(Remote Command Execution Vulnerability)
2) CMS(Contents Management System) 취약점
- 네이버 스마트에디터 : 파일 업로드 취약점
- 그누보드 : SQL Injection , 파일 업로드 취약점(그누보드4, 그누보드5), XSS ...
- 킴스큐 : 파리미터 변조 취약점 , 파일 업로드 취약점
* 이메일 : crehacktive3@naver.com
* 블로그 : http://www.crehacktive.co.kr
All
69 lectures ∙ (9hr 14min)
Course Materials:
All
52 reviews
4.9
52 reviews
Reviews 4
∙
Average Rating 5.0
Reviews 4
∙
Average Rating 4.3
Reviews 4
∙
Average Rating 5.0
5
믿고 보는 크리핵티브 강사님 강의~ 많은 것을 배울 수 있었습니다 감사합니다~ sql injection part3 강의는 언제쯤 만날 수 있을까요?
올해 안으로는 꼭 개설될 수 있도록 노력해보겠습니다. 감사합니다.
Reviews 1
∙
Average Rating 5.0
Reviews 11
∙
Average Rating 5.0
$51.70
Check out other courses by the instructor!
Explore other courses in the same field!