OWASP Top 10 in 10 Min! (Kinda)
NahamSec NahamSec
126K subscribers
24,859 views
0

 Published On May 16, 2022

Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training
This video was sponsored by Detectify (detectify.com)

Buy Me Coffee:
https://www.buymeacoffee.com/nahamsec

Live Every Sunday on Twitch:
  / nahamsec  

Free $100 DigitalOcean Credit:
https://m.do.co/c/3236319b9d0b

Follow me on social media:
  / nahamsec  
  / nahamsec  
https://twitch.com/nahamsec
https://hackerone.com/nahamsec
  / nahamsec1  

Github:
https://github.com/nahamsec

Nahamsec's Discord:
https://discordapp.com/invite/ucCz7uh

0:00 Intro
2:30 A1: Broken Access Control
3:56 A2: Cryptographic Failures
4:35 A3: Injections
6:41 A4: Insecure Design
8:30 A5: Security Misconfiguration
10:06 A6: Vulnerable and Outdated Components
11:30 A7: Identification and Authentication Failures
12:42 A8: Software and Data Integrity Failures
14:02 A9: Security Logging and Monitoring Failures
14:49 A10: Server-Side Request Forgery (SSRF)
17:35 Resources

show more

Share/Embed