This course explores vulnerabilities caused by improper cryptographic implementations or lack of encryption, leading to sensitive data exposure. You'll learn how attackers exploit weak cryptography and how to securely protect secrets, passwords, and sensitive information.
Overview
Syllabus
- Unit 1: Introduction to Cryptographic Failures
- Unit 2: Mitigating Hardcoded Secrets
- Discovering Hardcoded Secrets with Grep
- Replace Hardcoded Secret with Environment Variable
- Excluding Sensitive Files from Version Control
- Replace Hardcoded Secrets with Environment Variables
- Unit 3: Secure Password Storage
- Demonstrating SHA-256 Vulnerability Without Salt
- Replace SHA-256 with bcrypt for API Key Hashing
- Implement Bcrypt Password Hashing for Secure Authentication
- Unit 4: Application Level Encryption
- Demonstrating Plaintext Data Storage Vulnerabilities
- Implementing Secure Card Number Hashing
- Implementing Secure Credit Card Storage with Hashing and Masking
- Implementing Secure Card Number Verification