OWASP Top 10 methodology and risk rating, Threat modeling (STRIDE, DREAD, PASTA), Authentication flaws (weak passwords, credential stuffing, broken session management), Authorization bypass techniques (IDOR, missing a...
OWASP Top 10 methodology and risk rating, Threat modeling (STRIDE, DREAD, PASTA), Authentication flaws (weak passwords, credential stuffing, broken session management), Authorization bypass techniques (IDOR, missing access control), Security misconfiguration patterns, Sensitive data exposure risks, HTTP security headers (CSP, HSTS, X-Frame-Options).
SQL injection attack vectors (in-band, blind, time-based, error-based), Prepared statements and parameterized queries, ORM injection prevention, NoSQL injection (MongoDB, CouchDB), Command injection and OS command execution, LDAP injection, XML External Entity (XXE) attacks, Input validation and sanitization strategies, Web Application Firewall (WAF) rules.
XSS attack types (reflected, stored/persistent, DOM-based), XSS payloads and filtering evasion techniques, Content Security Policy (CSP) implementation, HttpOnly/Secure cookies, CSRF attack mechanics and token-based mitigation, SameSite cookie attribute, Double-submit cookie pattern, CSRF Guard frameworks and synchronizer token pattern.
Business logic flaws (race conditions, logic bypass, workflow manipulation), API security (broken object level authorization - BOLA, excessive data exposure), Rate limiting and throttling strategies, JWT security (alg confusion, none algorithm, kid header injection), OAuth 2.0 pitfalls (redirect URI manipulation, insufficient scope validation), GraphQL security (deep recursion, batching attacks).
Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST), Software Composition Analysis (SCA), Security requirements in Agile, Threat modeling in sprints, Secure code review checklist, Container security (Dockerfile best practices, image scanning), CI/CD security (secrets management, pipeline scanning), RASP and runtime protection.