-
Object Serialization/Injection: Understanding the risks associated with object serialization and how it can be exploited by attackers to execute malicious code.
-
XML Injection/XPath Injection: Learning how to identify and prevent XML injection attacks that can lead to sensitive data disclosure or server-side code execution.
-
Source Code Auditing and Automation: Understanding the importance of source code auditing and automating this process to find vulnerabilities in web applications.
-
Chaining Low-hanging Fruits: Learning how to chain multiple low-severity vulnerabilities to achieve a higher impact attack.
-
Compromising Cloud Estate using Web Applications: Understanding the unique risks associated with web applications in cloud environments and how they can be exploited by attackers.
-
Path Normalization and Parsing Inconsistencies: Learning how to identify and prevent path normalization and parsing inconsistencies in web applications that can lead to security vulnerabilities.
-
Mass Assignment: Understanding how mass assignment can be exploited by attackers to modify sensitive data in web applications.
-
Common Authentication and Authorization Flaws: Identifying and preventing common authentication and authorization flaws such as password cracking, brute-force attacks, session hijacking, and privilege escalation.
-
Template Injection Vulnerabilities: Understanding how template injection vulnerabilities can be exploited by attackers to execute arbitrary code on web servers.
-
Overall, these topics are important for developers and security professionals to understand in order to effectively secure web applications against potential threats and attacks.