001. Learning objectives
002. 14.1 Understanding Web App Concepts and Identifying Web App Threats
003. 14.2 Exploring the OWASP Top 10 for Web Applications
004. 14.3 Applying Web App Hacking Methodologies and Footprinting Web Infrastructure
005. 14.4 Analyzing Web Applications and Bypassing Client-Side Controls
006. 14.5 Attacking Authentication Mechanisms
007. 14.6 Attacking Session Management Mechanisms
008. 14.7 Exploiting Authorization Schemes and Access Controls Flaws
009. 14.8 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities
010. 14.9 Understanding Server-side Request Forgery (SSRF) Vulnerabilities
011. 14.10 Exploiting Buffer Overflows and Creating Payloads
012. 14.11 Attacking Application Logic Flaws and Shared Environments
013. 14.12 Attacking Database Connectivity and Web App Clients
014. 14.13 Attacking Web Services, Exploiting Web APIs, Webhooks, and Web Shells
015. 14.14 Ensuring Web App Security