Enterprise Ethical Hacking Cloud Applications
Securing of the web application is an enormous task. In this talk, we will explore how to protect enterprise applications. We will explore different kinds of vulnerabilities and hot to secure your applications properly. Security patterns need to be understood by first wearing the hat of a hacker and then putting the hat as a defender. In this session, we will explore different security patterns and determine how to prevent attacks.
We will be using Kali Linux to understand Ethical hacking techniques using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.
In this session, you will learn:
- Threat Modeling techniques using the Threat modeling tool
- Reconnaissance to gather information, Google hacking database, Exploit Database
- Scanning for vulnerabilities using Burp Proxy, FoxyProxy, SSL Scan, OWASP ZAP
- Exploitation with DOS attacks
- Risk Analysis
You may also be interested in
Ever wondered what makes a cloud-native application “cloud-native”? Ever wondered what the unique challenges are and how best to address...
Three evolutionary ecosystems work well together Java, Containers, and Kubernetes. Past versions of Java were never designed to be “container aware”....