This room aims at providing the basic introduction to XML External Entity (XXE vulnerability)
In the previous blog post, I showed you how to bypass poorly configured authentication via dictionary attack or re-registration. Today, I'm going to speak about JWT - what it is, how it works and one of possible ways to exploit it.
Learn how to attack authentication mechanisms used in web applications
Understand and exploit a web server that is vulnerable to the Local File Inclusion (LFI) vulnerability.
Learn how to use OWASP ZAP from the ground up. An alternative to BurpSuite.
How it works and why should I learn it?