Project

General

Profile

Activity #1518

Updated by Bhaveeni Narottam 14 days ago

Training video assigned for 2 week training track: https://youtu.be/YYe0FdfdgDU?si=PwhgdNPlr0N0waGf 

 Covered the following vulnerabilities: 
 1. Broken Object Level Authorization (BOLA) 
 2. Broken Authentication 
 3. Broken Object Property Level Authorization 
 4. Unrestricted Resource Consumption 
 5. Broken Function Level Authorization 
 6. Unrestricted Access to Sensitive Business Flows 
 7. Server Side Request Forgery (SSRF) 
 8. Security Misconfiguration 
 9. Improper Inventory Management 
 10. Unsafe Consumption of APIs

Back