Lecture 30 - Introduction to Injection Vulnerabilities

In the next few sections, we're going to cover various types of Injection Vulnerabilities, such as OS Command Injection, Cross-site Scripting, or XSS and SQL injections.

Many people think these vulnerabilities are a thing of the past, but they're simply incorrect.

According to OWASP, which is, like we said, is a non-profit organization.

Injection vulnerabilities are the third most common in all of the tested websites.

Companies like TikTok, Snapchat, Twitter and PlayStation and much more have paid thousands of dollars to the hunters that discovered such vulnerabilities in their platforms because of the severity of these vulnerabilities.

So the people that think that these vulnerabilities are not common simply lack the skills of discovering them.

I agree they can be a little bit tricky, and that's why we're actually going to spend a good bit of time going through them, through their different types, their different categories and different scenarios that they can exist in.

And I'm going to show you different ways of discovering them and different ways of bypassing security.

So by the end of the section, you're going to be an expert at discovering these vulnerabilities and you'll be able to discover them in websites and features that most people will think are secure.

Complete and Continue  

Become a Member and Get Unlimited Access to 310+ Top Cyber Security Courses.