#8 10 Min to Develop, 5 min to Hack❓ | Software and Data Integrity Failures | owasp top 10 2021

preview_player
Показать описание
#hackervlog #owasptop10 #owasp
Another new addition to the 2021 roster is software and data integrity failures. These failures can take many forms, particularly since as the web evolves it is more and more common to use third party code and services within web applications. These failures can be summarised as follows:
● Usage of code that does not verify integrity of source
● Usage of third party plugins where you do not control the source
● Plugins and extensions from untrusted sources
● The introduction of or potential for compromise or unauthorised access
● Auto-updates assume trust of the source

WordPress website administrators make heavy usage out of the official WordPress repository. Other CMS platforms have similar libraries that are used. Unlike proprietary software platforms these repositories are all open source and the code is publicly accessible and able to be scrutinised. This is a major advantage but not foolproof. Many open source plugins over the last few years have been targeted by attackers after serious vulnerabilities were discovered within them.
It is also unfortunately common for website owners to use hacked or “nulled” plugins/themes on their website. These are almost always coupled with backdoors that will be used to compromise the website environment.

owasp top 10 2021 with examples help you to understand the owasp top 10 for web app easily. Recently owasp updated it's web app testing standard with owasp top 10 2021. So enjoy our owasp top 10 practical video.

👇Join this channel to get access to perks:
___________________________________________________________________________________
**Stay Connected with us**
👇Do you have any Questions? Ask your Enquiry and Interact Live 1:1 with our Experts (Mr. Tapan Kumar Jha & Miss. Riddhi Soral)

👇Learn *Free Courses* at:

👇Do you want to Join *Free Cyber Security Internship*?

👇Fill below form to join "Hacker Meet":-

👇 For *Cyber Security & Coding* Diploma/Courses Enquiry Visit:

👇Join our Telegram Group:-

👇Follow us on Twitter:

👇Follow us on *Instagram*:

👇Download Free *Cyber Security Software* at:

👇Report Free *Cyber Crime* at:

Intro Music credits-

Disclaimer:-
This video is made available for educational and informational purposes only. We believe that everyone must be aware of ethical hacking and cyber security to avoid different types of cyberattacks on computers, websites, apps, etc. Please regards the word hacking as ethical hacking everytime we use it.

All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. Hacker Vlog is not responsible for any misuse of the provided information.
Рекомендации по теме
Комментарии
Автор

Sir desktop support Engineer job cyber security se related hai.
Congratulation sir

hackerwolf
Автор

Bhai apka koi certification course h kya crtp, pntp

techtalksandmore
Автор

Hey I like to watch your video but could you pls do one this during live session pls don't answer all the comments in between it's very distracting You can do it at the end of this session, also your videos audio is very slow so pls look into my points and kindly consider..💗

pratibhasingh
Автор

Hii everyone suggest me a best cyber security project for my final year, leaving keylogger 😜 and some common project

rohityakkundi