This course highlights configuration errors—from leftover sample endpoints and directory listing to detailed error messages—that can expose the pastebin application to attackers.
Overview
Syllabus
- Unit 1: Security Misconfiguration Essentials
- Unit 2: Default Credentials in Python
- Exploiting Default Credentials for Data Access
- Implementing Secure Admin User Initialization
- Securing Admin Credentials with Environment Variables
- Implementing JWT Based Authentication System
- Implementing Role Based Access Control
- Unit 3: Directory Listing Vulnerabilities
- Exploiting Unrestricted File Access Vulnerability
- Crafting Your Own File Access Exploit
- Removing the Vulnerable File Route
- Implementing Secure File Access with Whitelists
- Blocking Directory Root Access Attempts
- Unit 4: Detailed Error Message Risks
- Observing Exposed Error Information
- Implementing Secure Internal Error Logging
- Environment Based Error Response Configuration