[Pluralsight] Web App Hacking: Hacking Password Reset Functionality - Pluralsight
Web App Hacking: Hacking Password Reset Functionality - Pluralsight

Web App Hacking: Hacking Password Reset Functionality - Pluralsight

image description

Course Description

This course helps you understand different types of vulnerabilities in password reset functionality. You will learn how to test web applications for various flaws in password reset functionality and how to provide countermeasures for these problems. Password reset functionality is very commonly implemented in modern web applications. In this course, Web App Hacking: Hacking Password Reset Functionality, you will learn that this sensitive functionality is often insecurely implemented and it can lead to very severe consequences. First, you will learn how password reset link can be disclosed over insecure channel and how it can leak to external domain via Referer header. Next, you will learn how the attacker can get unauthorized access to the account of arbitrary user as a result of Insecure Direct Object Reference in password reset functionality. You will also learn how the attacker can impersonate a user when session management is insecurely implemented at the time of password resett

ing. Finally, you will learn about weaknesses in lifecycle of password reset link and you will see how the attacker can enumerate users as a result of a weakness in password reset functionality. By the end of the course, you will know how to test web applications for various flaws in password reset functionality. What's more, you will learn how to implement this functionality securely.

What you will learn

Hi everyone, my name is Dawid, welcome to my course, Web App Hacking: Hacking Password Reset Functionality. I am a security instructor, researcher, and bug hunter. Password reset functionality is very commonly implemented in modern web applications. It turns out however, that this sensitive functionality is often insecurely implemented and it can lead to very severe consequences. I will show you how a password reset link can be disclosed over an insecure channel, and how it can leak to an external domain by a referer header. You will learn how that hacker can get an unauthorized access to the account of the arbitrary user as a result of insecure direct object reference in password reset functionality. I will demonstrate how that hacker can impersonate a user when session management is insecurely implemented at the time of password resetting. I will discuss various flows in lifecycle of password reset link, and I will show you how that hacker can enumerate users as a result of a weakness in password reset functionality. By the end of the course you will know how to test web applications for various flaws in password reset functionality. What's more, you will learn how to implement this functionality securely. I hope you will join me on this journey to learn about attacks on password reset functionality with the Web App Hacking: Hacking Password Reset Functionality course at Pluralsight.

Curriculum

Section 1: Course Overview

Section 2: Introduction

Section 3: Leakage of Password Reset Link

Section 4: Insecure Direct Object Reference

Section 5: Insecure Session Management

Section 6: Weaknesses in Lifecycle of Password Reset Link

Section 7: User Enumeration

Section 8: Summary