Abstract

Vulnerabilities such as server-side request forgery (SSRF) and SQL injections still make it to the top of the OWASP Top 10. These vulnerabilities could allow a skilled attacker to gain access to unauthorized data and compromise your infrastructure. In this workshop, you will get the opportunity to think like an attacker by performing various attacks against a web application. 

You will also see, as a defender, how you can leverage Datadog Application Security Monitoring to identify which users are targeting your applications and which part of your code is impacted. By the end of this workshop, you will understand how to quickly detect and respond to threats by getting visibility into code-level exploits.

Technical Requirements

In order to complete the course, you will need:

  • Google Chrome or Firefox
  • Third-party cookies must be enabled to access labs

Course Navigation

At the bottom of each lesson, click MARK LESSON COMPLETE AND CONTINUE button so that you are marked complete for each lesson and can receive the certificate at the end of the course.

Course Enrollment Period

Please note that your enrollment in this workshop ends after 10 days.

Workshop Curriculum

    1. Lab: Hacking Your Web Applications

    2. Feedback

    3. Additional Resources

[Deprecated] Hacking Your Web Applications: From Benign Reconnaissance to Code-Level Exploits

  • 3 hours to complete
  • 1 Lesson
  • Beginner