From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,500 courses taught by industry experts.

Learning objectives

Learning objectives

- Welcome to lesson 15, Exploiting Systems and Applications. In this lesson, we're going to start by going over how to perform on path attacks or previously known as man in the middle attacks. We're going to go over the OWASP top 10 risk against web applications and other resources. Then we're got to shift gears into going over different vulnerabilities like cross-site scripting, cross-site request surgery, server-side request surgery, and how to hack databases and take advantage of vulnerabilities like SQL injection. Then we're going to go over how to exploit wireless vulnerabilities and how to exploit buffer overflows and create different payloads. Let's get started.

Contents