SDT 316- Testing for Use of Hard-Coded Credentials (UPDATED)
Applications that use authentication need a method for storing credentials that is secure because when a hacker recovers credentials, they can use them to authenticate with the application or to access external services. This course introduces ways to identify and mitigate this security weakness, referenced as CWE-798 by the 2020 CWE Top 25.
- Recognizing the impact of this vulnerability
- Techniques for finding Hard-Coded credentials in source code
- Application of secure coding best practices to prevent these attacks
- Testing to detect this security weakness