CEH v12: IDOR Attacks File Inclusion Attacks Web APIs and Webhooks

placeholder

Direct Object Reference and Local and Remote File Inclusion attacks can prove very harmful to web applications.

In this course you;ll examine how these attacks work and how to recognize them. First you;ll learn about Insecure Direct Object Reference (IDOR) attacks including how to find and exploit them. Next you;ll learn about Local File Inclusion (LFI) and Remote File Inclusion (RFI) attacks including how they work and how they can be leveraged to gain access to a remote system. Many of today web applications utilize an application programming interface (API) to facilitate interaction between clients and services. To wrap up this course you;ll learn about attributes of APIs how they compare with webhooks and common vulnerabilities and security countermeasures associated with both APIs and webhooks.

This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.