Вы находитесь на странице: 1из 1

Syllabus

Writing reports Directory traversal - Symmetric ciphers


Stream
Setting up Burp Proxy Command injection
Block
HTTP basics SQL injection - Asymmetric ciphers
- Detection, exploitation, and - Hashes
Cookie security - MACs
mitigation
HTML parsing for hackers - Exploiting blind SQLi
Crypto attacks
MIME sniffing
Session fixation - Stream cipher reuse
Encoding sniffing - ECB block reordering
Clickjacking - ECB partial decryption
Same-origin policy
File inclusion vulnerabilities - Padding oracles
Cross-site request forgery - Hash length extension
File upload vulnerabilities
Cross-site scripting
Null termination Crypto tricks
- Reflected
- Stored - Detecting ECB
vulnerabilities
- DOM - Determining block sizes
- Detection, exploitation, and Unchecked redirects - Determining controllable data
mitigation offsets
Secure password storage

Authorization bypasses and Crypto crash course


forced browsing - XOR

NEW CONTENT
Planned Content Launches - 2018 September: Secure Architecture Review

May: Lightweight Threat Modeling October: SSRF

June: Writing Good Reports November: Source Review Techniques

July: Introduction to Burp Suite December: Cookie Tampering Techniques

August: Intermediate Burp Suite Techniques & XML External Entity Attack

August: Advanced Burp Hacks for Bounty Hunters

Version: 1.1 | Last Updated: 2018-05-25

W W W . H A C K E R O N E . C O M / S A L E S @ H A C K E R O N E . C O M / + 1 ( 4 1 5 ) 8 9 1 - 07 7 7

Вам также может понравиться