![]() It goes pretty much straight to the point.Īs I was studying on my own time, I initially went for 90 days to have more than enough time to finish the course while doing it besides my normal work. The course is highly technical orientated and there is not much general discussion about code audits. I Would recommend the course to people who work with code audits or penetration testing. Also, it helps to have, or at least develop, a decent method for searching vulnerabilities from large applications to narrow down the code that you need to go through. Net, Java, Javascript to PHP applications on the exercises and there are more that a few programs that are used for examining applications.Ĭourse is a bit more on the advanced side and some skills you should have (in my opinion) are programming knowledge from PHP, Java, Javascript and.Net. dnSpy or jd-gui, or just by reading the application source files that were supplied with the application (.php or. ![]() Source code is either acquired by decompiling the target application with e.g. The objective is to expand and develop students knowledge about web application penetration testing and security research, including exploit development. ![]() ![]() The Advanced Web Attacks and Exploitation, AWAE, course is mainly about code auditing and learning how to chain multiple vulnerabilities to exploit the target system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
June 2023
Categories |