Hacking Your Web Applications: From Benign Reconnaissance to Code-Level Exploits
By the end of this workshop, you will understand how to quickly detect and respond to threats by getting visibility into code-level exploits.
The video for this workshop was originally recorded for a live workshop that took place at Dash. If you want to see this topic as a fully-supported self-paced course, please fill out the feedback survey following the lab to submit your vote.
Vulnerabilities such as server-side request forgery (SSRF) and SQL injections still make it to the top of the OWASP Top 10. These vulnerabilities could allow a skilled attacker to gain access to unauthorized data and compromise your infrastructure. In this workshop, you will get the opportunity to think like an attacker by performing various attacks against a web application. You will also see, as a defender, how you can leverage Datadog Application Security Monitoring to identify which users are targeting your applications and which part of your code is impacted. By the end of this workshop, you will understand how to quickly detect and respond to threats by getting visibility into code-level exploits.
At the bottom of each lesson, click MARK LESSON COMPLETE AND CONTINUE button so that you are marked complete for each lesson and can receive the certificate at the end of the workshop.
Introduction
Known bugs
Video Lesson
Lab: Hacking Your Web Applications
Feedback
Further Reading
Slides