Recommended Paths (Hands-On Only): Threats
This article describes our Recommended (Hands-On Only) Threat Paths.
Foundational | HackEDU: Credential Reuse
Learn techniques for preventing credential reuse and credential stuffing attacks.
Hands-On Only | Total Learning Path Duration: 1 hour 15 minutes
Foundational | HackEDU: Cross-Site Scripting (XSS)
Learn about DOM-Based, Reflected, and Stored Cross-Site Scripting.
Hands-On Only | Total Learning Path Duration: 45 minutes
Foundational | HackEDU: Injection Attacks
Learn how to prevent SQL, NoSQL, Command, XXE, and XSS injection attacks.
Hands-On Only | Total Learning Path Duration: 3 hours 15 minutes
Foundational | HackEDU: NoSQL Security
Learn about NoSQL injection attacks and how to prevent them.
Hands-On Only | Total Learning Path Duration: 45 minutes
Foundational | HackEDU: Publicly Disclosed Vulnerabilities
These lessons are based on vulnerabilities found in real applications from HackerOne's bug bounty program and other publicly disclosed vulnerabilities where you can experiment in a safe and legal environment.
Hands-On Only | Total Learning Path Duration: 2 hours 45 minutes
Foundational | HackEDU: Server-Side Request Forgery (SSRF)
Learn about SSRF and then walk through a real world example of the exploit.
Hands-On Only | Total Learning Path Duration: 1 hour
Foundational | HackEDU: SQL Security
Learn what an SQLi attack is and how to prevent it.
Hands-On Only | Total Learning Path Duration: 45 minutes