Hacking AngularJS Applications

Learn How to Detect and Exploit Security Vulnerabilities in AngularJS Applications

Ratings 5.00 / 5.00
Hacking AngularJS Applications

What You Will Learn!

  • Explore how hackers can steal secrets from AngularJS applications
  • Learn about different types of vulnerabilities in AngularJS applications
  • Discover how to find these vulnerabilities step by step in practice (DEMOS)
  • Understand how hackers escalate vulnerabilities found in AngularJS applications and launch more powerful attacks
  • Explore how hackers can hack your AngularJS application with a purely static template

Description

AngularJS is widely used in modern web applications. What’s more - security vulnerabilities in AngularJS applications can lead to very severe consequences. That’s why this subject is interesting for hackers.

In this course you’ll learn how to detect and exploit different types of vulnerabilities in AngularJS applications. I’ll go step by step through popular real-world scenarios and I’ll demonstrate how hackers can steal secrets from AngularJS applications. I’ll also show you how hackers escalate vulnerabilities found in AngularJS applications and launch more powerful attacks. Finally, I’ll present one of the most underestimated subjects related to AngularJS security – hacking an AngularJS application with a purely static template.

*** For every single attack presented in this course there is a DEMO ***
  so that you can see, step by step, how these attacks work in practice. This is actually what you need to become a successful AngularJS application hacker.

Attacks presented in this course:

1.  AngularJS: Template Injection and $scope Hacking - Part 1

2. AngularJS: Template Injection and $scope Hacking - Part 2

3. AngularJS: Going Beyond the $scope

4. AngularJS: Hacking a Static Template

Learn How to Detect and Exploit Security Vulnerabilities in AngularJS Applications

Note: you can get paid for these bugs in bug bounty programs.

Who Should Attend!

  • Penetration testers, ethical hackers, bug hunters, security engineers / consultants

TAKE THIS COURSE

Tags

Subscribers

10

Lectures

6

TAKE THIS COURSE