CySec101 Ep.34: OWASP Top 10 Hacking Techniques πŸ”

Learn about the OWASP Top 10 hacking techniques in this beginner-friendly Cyber Security episode on TryHackMe. Support Hackaholics Anonymous!

CySec101 Ep.34: OWASP Top 10 Hacking Techniques πŸ”
Hank Hackerson
1.1K views β€’ Jan 30, 2025
CySec101 Ep.34: OWASP Top 10 Hacking Techniques πŸ”

About this video

Want to show your support? Consider joining Hackaholics Anonymous.
https://youtube.com/@HankHacksHackers/join
By joining the Hackaholics Anonymous community, you'll get direct access to me, a community of supportive likeminded individuals, and exclusive perks like:
- Bug Bounties
- Python Automations for CySec, PenTesting, SysAdmin
- Exclusive Content
- Live Chats / Q&A's / AMA's
- And much, much more!
https://youtube.com/@HankHacksHackers/join
**************************
Protect Yourself
**************************
Want an all-in-one AntiVirus/VPN $0.07 per day?
- SurfShark Link (VPN & AntiVirus For Unlimited Devices For $2.20/mo):
--- https://bit.ly/SurfShark-FullPlan
**************************
Join TryHackMe
**************************
Wanna practice hacking without getting caught?
- TryHackMe Discount Link:
--- https://bit.ly/TryHackMe-Discount

OWASP Top 10 Time Stamps:
00:00 Overview (Start Here)
01:59 Hackaholics Anonymous
02:40 Intro to OWASP Top 10
05:47 1. Broken Access Control
08:32 Broken Access Control Challenge
12:55 2. Cryptographic Failures
16:04 Cryptographic Failures (Supporting Material 1)
20:02 Cryptographic Failures (Supporting Material 2)
23:58 Cryptographic Failure Challenge
31:40 3. Injection
36:08 3.1. Command Injection
51:42 4. Insecure Design
57:13 5. Security Misconfiguration
01:05:34 6. Vulnerable and Outdated Components
01:07:21 Vulnerable and Outdated Components - Exploit
01:14:56 7. Identification and Authentication Failures
01:18:50 Identification and Authentication Failures Practical
01:23:31 8. Software and Data Integrity Failures
01:28:23 Software Integrity Failures
01:32:57 Data Integrity Failures
01:45:36 9. Security Logging and Monitoring Failures
01:52:03 10. Server-Side Request Forgery (SSRF)
02:01:21 SSRF Extra-Credit

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

1.1K

Likes

48

Duration

02:09:05

Published

Jan 30, 2025

User Reviews

4.5
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.