The following warnings occurred:
Warning [2] Undefined array key "extra" - Line: 100 - File: inc/plugins/google_seo/url.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/google_seo/url.php 100 errorHandler->error_callback
/inc/plugins/google_seo.php 317 require_once
/inc/class_plugins.php 38 require_once
/inc/init.php 263 pluginSystem->load
/global.php 20 require_once
/printthread.php 16 require_once
Warning [2] Undefined variable $location - Line: 1250 - File: inc/plugins/google_seo/url.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/google_seo/url.php 1250 errorHandler->error_callback
/inc/plugins/google_seo/url.php 174 google_seo_url_hook
/inc/plugins/google_seo.php 317 require_once
/inc/class_plugins.php 38 require_once
/inc/init.php 263 pluginSystem->load
/global.php 20 require_once
/printthread.php 16 require_once
Warning [2] Undefined variable $unreadreports - Line: 38 - File: global.php(961) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/global.php(961) : eval()'d code 38 errorHandler->error_callback
/global.php 961 eval
/printthread.php 16 require_once
Warning [2] Undefined variable $mysupport_tech_notice - Line: 38 - File: global.php(961) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/global.php(961) : eval()'d code 38 errorHandler->error_callback
/global.php 961 eval
/printthread.php 16 require_once
Warning [2] Undefined variable $mysupport_assign_notice - Line: 38 - File: global.php(961) : eval()'d code PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/global.php(961) : eval()'d code 38 errorHandler->error_callback
/global.php 961 eval
/printthread.php 16 require_once
Warning [2] Undefined array key 1053485 - Line: 833 - File: inc/plugins/google_seo/url.php PHP 8.1.33 (Linux)
File Line Function
/inc/class_error.php 157 errorHandler->error
/inc/plugins/google_seo/url.php 833 errorHandler->error_callback
/inc/plugins/google_seo/url.php 1412 google_seo_url_cache
/inc/functions.php 6559 google_seo_url_thread
/printthread.php 124 get_thread_link



Softwarez.Info - Software's World!
Node js Security: Pentesting and Exploitation - Printable Version

+- Softwarez.Info - Software's World! (https://softwarez.info)
+-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone)
+--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials)
+--- Thread: Node js Security: Pentesting and Exploitation (/Thread-Node-js-Security-Pentesting-and-Exploitation)



Node js Security: Pentesting and Exploitation - AD-TEAM - 08-03-2025

[Image: ccd5e28cd72ae67a94f3988420363f94.jpg]
Node.js Security: Pentesting and Exploitation
English | 2015 | mp4 | H264 1152x720 | AAC 2 ch | 2 hrs | 206 MB
eLearning, IT & Software, Network & Security | Skill level: all level

Learn about Node.js Security by Code Review, Pentesting and Automation.

Node.js® is a platform built on Chrome's JavaScript runtime for easily building fast, scalable network applications. This new technology is widely getting adopted in various organisations. Like any platform, Node.js has it's on set of features that developers blindly use without much thought on security. The heart of Node is JavaScript, so it inherits most of the issues that are found at client side JavaScript. However on the server side, it executes on V8 JavaScript engine which gives node the capabilities similar to that of any other server side scripting languages. That difference adds some unique attack surface to Node.js platform. Node.js Security: Pentesting & Exploitation course is one it's kind to teach about Node.js Security.

This course is designed in such a way to address both the requirements of a Web Developer as well as a Web Pentester. For a Web Developer, he will get to know about secure coding, what all things can make his code insecure and how to identify security issues in his code. For the Web Security guy, it gives him an idea on how he should go with securing Node.js Application by performing effective Code Review, Implementing Secure Code, Pentesting, Automating the process of Code Review and finally exploiting the vulnerabilities identified.

As a take away, this course will introduce an open source Node.js Security Analysis tool named NodeJsScan, a Node.js Static Analysis Tool that can detect possible security issues, insecure code and outdated libraries. This tool allows you to extend the scan using it's customisable rule set. You can add your own rules on the go to catch security issues.

Finally this course is one of it's kind with hands on demonstration and walkthrough on identifying security issues, exploiting and fixing them.

The course will cover the following thing
• Introduction
• Node Specific Security Issues
• Global Namespace Pollution
• HTTP Parameter Pollution (HPP)
• eval() is Evil
• Remote OS Command Execution
• Untrusted User Input
• Regex DoS
• Information Disclosure
• Lack of Secure Code
• Code Review
• Automated Code Review with NodeJsScan

What are the requirements?
- Fundamentals of Web Applications
- How to write and run a simple Node.js application

What am I going to get from this course?
- Over 14 lectures and 1 hour of content!
- Learn how to do the Security Certification of Node.js Application
- Learn how to build a secure Node.js Application
- Learn how things can go wrong in Node.js
- Learn to find security issues in Node.js Applications
- Learn how to exploit the issues for PoC

What is the target audience?
- Web Developers
- Web Application Pentesters
- Security Engineers
- Web Application Security Consultants
- Web Security Enthusiasts
- Hackers
- Students
- Web Application Designers

Screenshots:

NO MIRRORS PLEASE


DDownload

[To see links please register or login]

RapidGator

[To see links please register or login]

NitroFlare

[To see links please register or login]