Welcome
Ethical JavaScript hacking
()
What you should know
()
1. Introduction and Setup
What is ethical hacking?
()
Overview of the cyber kill chain
()
Plan an attack strategy
()
Base project setup
()
2. Reconnaissance
Reconnaissance introduction
()
Introduction and setup for Snyk
()
Introduction and setup for Retire.js
()
Introduction to AppSensor
()
Review of the plan
()
3. Top Security Threats
Injection threat
()
Broken authentication
()
Sensitive data
()
XML external entities
()
Security misconfiguration
()
Insecure deserialization
()
Components with known vulnerabilities
()
Insufficient logging and monitoring
()
Ex_Files_Ethical_Hacking_JavaScript.zip
(1.0 MB)