WebGoat v7.1 Walk-through Series-Part 1

Published by

on

OWASP WebGoat v7.1 Web Hacking Simulation WalkThrough Series Part:1

WebGoat:

Description: It includes

  1. Access Control Flaws:
  • Using an Access Control Matrix : 1.01 min
  • Bypass a Path Based Access Control Scheme : 1:49 Min
  • LAB: Role Based Access Control
  • Stage 1:Bypass Business Layer Access Control : 3:41 Min
  • Stage 3: Bypass Data Layer Access Control: 5:37 Min
  1. AJAX Security: Description: It includes
  • LAB: DOM-Based cross-site scripting 9.01 Min
  • Stage 1:Image: 9.02 Min
  • Stage 2: Image tag using JavaScript: 9.50 Min
  • Stage 3: IFRAME using JavaScript: 9.59 Min
  • Stage 4:Fake Login form: 10.31 Min
  • Stage 5:Client-side HTML Entity encoding: 10:54 Min
  • LAB: Client Side Filtering: 12:29 Min
  • Stage 1: The information is stored on the client side: 12:30 Min
  • Stage 2: Fix the Problem: 14.16 Min
  • DOM Injection: 17:11 Min
  • XML Injection 19:24 Min
  • JSON Injection 24:01 Min
  • Silent Transactions Attacks 25:58 Min

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.