Uploaded by Dima Vodyantsky

Laboratory work 2 SEC

advertisement
Laboratory work 2
Dmytro Vodianytskyi
The OWASP Top Ten may be a essential archive made by the Open Web
Application Security Extend (OWASP) that highlights the ten most basic web
application security risks. It serves as a crucial asset within the field of
cybersecurity, advertising experiences into wants , points, and reason of this
archive.
Needs of OWASP
The OWASP Top Ten is born out of a squeezing require within the
computerized age for upgraded web application security. With the multiplication
of web-based administrations, the dangers related with online exercises have
developed significantly. OWASP addresses the ought to recognize, get it, and
moderate these dangers, giving a standardized system to secure web
applications viably.
5 OWASP Keywords/Topics
 Vulnerabilities: The OWASP Top Ten identifies the foremost common
vulnerabilities found in web applications, such as infusion assaults,
broken confirmation, and security misconfigurations.
 Mindfulness: It points to raise mindfulness around the predominant
security dangers, guaranteeing engineers and organizations stay educated
around the advancing danger scene.
 Prioritization: The record helps in prioritizing security efforts by
recognizing the foremost basic dangers, making a difference
organizations apportion assets viably.
 Guidance: OWASP Top Ten gives direction and proposals on how to
address and moderate these security dangers, advertising viable
arrangements and best hones.
 Responsibility: It underscores the shared obligation of engineers, security
experts, and organizations in securing web applications, emphasizing the
significance of collaboration and a proactive approach to security.
Purpose of OWASP
The primary purpose of OWASP Top Ten is to serve as a foundational resource
for developers, security experts, and organizations. It aims to guide these
stakeholders in identifying and addressing critical security risks, reducing the
likelihood of security breaches and data compromises. The responsibilities of
OWASP Top Ten lie in educating, informing, and empowering the community
to build and maintain secure web applications.
Conclusion
Within the present day advanced scene, the OWASP Top Ten proceeds to be
uncommonly valuable. Its viable direction and comprehensive scope of web
application security dangers make it an priceless asset. Designers can utilize it
to plan and code more secure applications, whereas security professionals can
use it to assess and upgrade the security pose of existing frameworks.
Organizations advantage from the OWASP Top Ten by executing proactive
security measures, defending delicate information, and keeping up client
believe. In a world where cyber dangers are ever-evolving, the OWASP Top Ten
is an fundamental device for anybody included in web application
improvement, security, or chance administration. Its pertinence perseveres, as
the require for secure web applications remains foremost in our progressively
advanced lives.
TrackHackMe
Tutorials
1. RootMe
Conclusion: In this room I got acquainted with nmap, and how to use it to scan ports and
services, also with gobusters util which help me to enumerate FTP, SMB, and web servers.The
most interesting part of the room was privilege escalation.
2. OWASP Juice Shop
Conclusion: In this room I have learned how to identify and exploit SQL injection, cross-site
scripting (XSS), insecure direct object references (IDOR), broken authentication, and sensitive
data exposure vulnerabilities.This room wasn’t that interesting as previous one(RootMe).
3. Basic Pentesting
Conclusion: This room covers mostly same topics as in previous 2 rooms. But with this room
I become more experienced in nmap for open ports and services. Also I dived more deeply in
privilege escalation
Download