Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CodeSignal

A05: Security Misconfiguration

via CodeSignal

Overview

This course highlights configuration errors—from leftover sample endpoints and directory listing to detailed error messages—that can expose the pastebin application to attackers.

Syllabus

  • Unit 1: Security Misconfiguration Essentials
  • Unit 2: Default Credentials in Python
    • Exploiting Default Credentials for Data Access
    • Implementing Secure Admin User Initialization
    • Securing Admin Credentials with Environment Variables
    • Implementing JWT Based Authentication System
    • Implementing Role Based Access Control
  • Unit 3: Directory Listing Vulnerabilities
    • Exploiting Unrestricted File Access Vulnerability
    • Crafting Your Own File Access Exploit
    • Removing the Vulnerable File Route
    • Implementing Secure File Access with Whitelists
    • Blocking Directory Root Access Attempts
  • Unit 4: Detailed Error Message Risks
    • Observing Exposed Error Information
    • Implementing Secure Internal Error Logging
    • Environment Based Error Response Configuration

Reviews

Start your review of A05: Security Misconfiguration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.