LAB 224, 225, 226, 227 – Defending Java Applications Against Forceful Browsing
The Defending Applications Against Forceful Browsing labs assess the learner’s ability to fix code that does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.
This Lab is available in 4 coding languages: Java, Python, Node.js, and C#.
LAB 310 – ATT&CK: File and Directory Permissions Modification
This lab uses the MITRE ATT&CK® framework to help learners understand how attackers may attempt to discover services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation using tools that are brought onto a system.
LAB 310 – ATT&CK: File and Directory Discovery
This lab uses the MITRE ATT&CK® framework to help learners to understand how attackers leverage port and/or vulnerability scans to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
Learn Labs
Consistent with Security Innovation’s overarching “Beyond the Code” mantra, Learn Labs keep organizations safe by highlighting vulnerabilities that can be recognized by most anyone involved in the SDLC — not just those closest to the code. Our focus this quarter is on vulnerabilities that can be found on a Cloud Infrastructure and Cloud-Native Applications.
LAB 133 – Identifying Exposure of Sensitive Information Through Environmental Variables
This lab assesses the learner’s understanding of how such an existing vulnerability on a server hosting an ecommerce application can be discovered and exploited.
LAB 134 – Identifying Plaintext Storage of a Password
Here, the learner gains insight into how adversaries can exploit such vulnerabilities to steal secrets, gain unauthorized access, establish persistence, penetrate further into a system, and plan more damaging attacks.
LAB 135 – Identifying URL Redirection to Untrusted Site
Once completing this lab, the learner should understand how adversaries can exploit such vulnerabilities to send users to a malicious site via a legitimate-looking URL to compromise their machine with malware or steal their credentials.
LAB 136 – Identifying Improper Neutralization of Script in Attributes in a Web Page
This lab assesses the learner’s understanding of how an existing persistent cross-site scripting vulnerability in the email templates of a cloud-native marketing automation SaaS suite can be discovered and exploited.
Learn more about Skill and Learn Labs on our Training page.
All of the latest Learn Lab and Course enhancement details can be found here.


