Book Content
chapters • 9h56m total length
1. Common security protocols
2. Performing Reconnaissance
3. XSS
4. CSRF/XSRF
5. SQL Injection
6. File Upload Issues
7. Metasploit and Web
8. XML attack vectors
9. Emerging Attack Vectors
10. OAuth 2.0 Security
11. API Testing Methodology














