This course explores vulnerabilities caused by improper cryptographic implementations or lack of encryption, leading to sensitive data exposure. You’ll learn how attackers exploit weak cryptography and how to securely protect secrets, passwords, and sensitive information.
Overview
Syllabus
- Unit 1: Introduction to Cryptographic Failures
- Unit 2: Eliminating Hardcoded Secrets
- Finding Hardcoded Secrets with Grep
- Advanced Secret Pattern Detection Exercise
- Setting Up Complete Secret Management Infrastructure
- Building Robust Configuration Validation Systems
- Unit 3: Secure Password Storage
- Exploiting Hash Vulnerabilities
- Fixing Password Hash Vulnerabilities
- Securing User Authentication with Bcrypt
- Unit 4: Application Level Data Protection
- Exposing Plaintext Card Data Vulnerability
- Implementing Secure Card Number Hashing
- Securing Payment Endpoints with Hashing
- Building Secure Card Verification Endpoint