Slide 1

Slide 1 text

Trending Vulnerabilities with Insights to OWASP TOP 10 By – Harsh Bothra

Slide 2

Slide 2 text

Who-Am-I? Cyber Security Consultant @RedHuntLabs Core Pentester @Cobalt.io Lazy Bug Bounty Hunter – Bugcrowd | Synack | Private Author | Blogger | Speaker Creator @ProjectBheem Going through #Learn365

Slide 3

Slide 3 text

AGENDA INTRODUCTION TO APPLICATION SECURITY OWASP TOP 10 TRENDING VULNERABILITIES HUNTING : MY WAY

Slide 4

Slide 4 text

Introduction to Application Security

Slide 5

Slide 5 text

Application Security – Tech Classification Web Application Mobile Application APIs Thick Clients

Slide 6

Slide 6 text

OWASP TOP 10 Injection Broken Authentication Sensitive Data Exposure XML External Entities Broken Access Control Security Misconfiguration Cross-Site Scripting Insecure Deserialization Using Component with Known Vulnerabilities Insufficient Logging and Monitoring

Slide 7

Slide 7 text

Commonly Identified Vulnerabilities Sensitive Information in JS & Public Resources Broken Access Controls Authorization Check Bypass & Privilege Escalations Server-Side Request Forgery Cross-Site Scripting Business Logic Abuse

Slide 8

Slide 8 text

Trending Vulnerabilitiies GraphQL Vulnerabilities WebSocket Vulnerabilities OAuth Vulnerabilities SAML Vulnerabilities NoSQL Injection Cache Based Vulnerabilities Bypasses JWT

Slide 9

Slide 9 text

Approaching Trending Vulnerabilities Hunting – My Way!

Slide 10

Slide 10 text

TIPS & TRICKS!

Slide 11

Slide 11 text

GET IN TOUCH AT Twitter: @harshbothra_ LinkedIn: /in/harshbothra Instagram: @harshbothra_ SpeakerDeck: /harshbothra Email: hbothra22@gmail.com

Slide 12

Slide 12 text

Thank you!