CEH v12: IDOR Attacks File Inclusion Attacks Web APIs and Webhooks
Direct Object Reference and Local and Remote File Inclusion attacks can prove very harmful to web applications.
In this course you;ll examine how these attacks work and how to recognize them. First you;ll learn about Insecure Direct Object Reference (IDOR) attacks including how to find and exploit them. Next you;ll learn about Local File Inclusion (LFI) and Remote File Inclusion (RFI) attacks including how they work and how they can be leveraged to gain access to a remote system. Many of today web applications utilize an application programming interface (API) to facilitate interaction between clients and services. To wrap up this course you;ll learn about attributes of APIs how they compare with webhooks and common vulnerabilities and security countermeasures associated with both APIs and webhooks.
This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.