Chevron Left
返回到 Exploiting and Securing Vulnerabilities in Java Applications

學生對 加州大学戴维斯分校 提供的 Exploiting and Securing Vulnerabilities in Java Applications 的評價和反饋

11 個評分
4 條評論


In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss various mitigation strategies. We do this by exploiting WebGoat, an OWASP project designed to teach penetration testing. WebGoat is a deliberately vulnerable application with many flaws and we take aim at fixing some of these issues. Finally we fix these issues in WebGoat and build our patched binaries. Together we will discuss online resources to help us along and find meaningful ways to give back to the larger Application Security community....



1 - Exploiting and Securing Vulnerabilities in Java Applications 的 4 個評論(共 4 個)

創建者 Vikram

Jan 30, 2020

Very Good course material. dicover it, try it, fix it method.


Oct 03, 2019

course is good but it seems like, i am learner of this course..There is no one who can review my asginments -_-'

創建者 Giorgio B

Oct 31, 2019

Good start of Web Exploitation. But why is there "Java" in the name of the course? The course is much more generic than "Java Applications"

創建者 Janis W

Feb 23, 2020

Peer assignments are copy pasted and don't always work correctly. Github repository is outdated and no response from instructors.