CEH v11: CSRF IDOR LFI & RFI Attacks

placeholder

Cross-Site Request Forgery Direct Object Reference and Local and Remote File Inclusion attacks can prove very harmful to web applications. In this course youll examine how these attacks work and how to recognize them. First youll explore CSRF attacks and how they can be leveraged to attack users. Next youll learn about the IDOR attack including how to find and exploit it. Finally youll learn about LFI and RFI attacks including how they work and how they can be leveraged to gain access to a remote system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.