Course Summary

Advanced Web Hacking course talks about a wealth of hacking techniques to compromise web applications, APIs and associated end-points. This course focuses on specific areas of app-sec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). This hands-on course covers neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs. In this course vulnerabilities selected are ones that typically go undetected by modern scanners or the exploitation techniques are not so well known.

Trained delegates can:

• Perform security testing to identify and safely exploit complex web vulnerabilities that get missed by scanners and other automated tools – this can help you detect vulnerabilities and recommend patching accordingly.
• Design this testing around real-world attacker behaviour and tooling, making it relevant to the threats facing your organisation.
• Customise offensive tooling to generate tailored (rather than “out of the box”) payloads that lead to more advanced testing.
• Recommend measures to circumvent any conditions that could lead to the emergence of vulnerabilities.
• Understand the business impact of web vulnerabilities and articulate this to key stakeholders.
• Take on greater responsibility in the team and become an advocate of security in the wider business.

INTRODUCTION
• Lab Setup And Architecture Overview
• Introduction To Burp Features

ATTACKING AUTHENTICATION AND SSO
• Token Hijacking attacks
• Logical Bypass / Boundary Conditions
• Bypassing 2 Factor Authentication
• Authentication Bypass using Subdomain • Takeover
• JWT/JWS Token attacks
• SAML Authorization Bypass
• OAuth Issues

PASSWORD RESET ATTACKS
• Session Poisoning
• Host Header Validation Bypass
• Case study of popular password reset fails

BUSINESS LOGIC FLAWS / AUTHORIZATION FLAWS
• Mass Assignment
• Invite/Promo Code Bypass
• Replay Attack
• API Authorisation Bypass
• HTTP Parameter Pollution (HPP)

XML EXTERNAL ENTITY (XXE) ATTACK
• XXE Basics
• Advanced XXE Exploitation over OOB channels
• XXE through SAML
• XXE in File Parsing

BREAKING CRYPTO
• Known Plaintext Attack (Faulty Password Reset)
• Padding Oracle Attack
• Hash length extension attacks
• Auth bypass using .NET Machine Key
• Exploiting padding oracles with fixed IVs

REMOTE CODE EXECUTION (RCE)
• Java Serialisation Attack
• Binary
• XML
• SerialVersionUID Mismatch
• .Net Serialisation Attack
• PHP Serialization Attack
• Python serialization attack
• Server Side Template Injection
• Exploiting code injection over OOB channel

SQL INJECTION MASTERCLASS
• 2nd order injection
• Out-of-Band exploitation
• SQLi through crypto
• OS code exec via powershell
• Advanced topics in SQli
• Advanced SQLMap Usage and WAF bypass
• Pentesting GraphQL
• Introspection based attacks on GraphQL

TRICKY FILE UPLOAD
• Malicious File Extensions
• Circumventing File validation checks
• Exploiting hardened web servers
• SQL injection via File Metadata

SERVER SIDE REQUEST FORGERY (SSRF)
• SSRF to query internal network
• SSRF to exploit templates and extensions
• SSRF filter bypass techniques
• Various Case studies

ATTACKING THE CLOUD
• SSRF Exploitation
• Serverless exploitation
• Google Dorking in the Cloud Era
• Cognito misconfiguration to data exfiltration
• Post Exploitation techniques on Cloud-hosted applications
• Various Case Studies

ATTACKING HARDENED CMS
• Identifying and attacking various CMS
• Attacking Hardened WordPress, Joomla and Sharepoint

WEB CACHING ATTACKS
MISCELLANEOUS VULNERABILITIES
• Unicode Normalization attacks
• Second order IDOR attack
• Exploiting misconfigured code control systems
• HTTP Desync attack

ATTACK CHAINING N TIER VULNERABILITY CHAINING LEADING TO RCE
VARIOUS CASE STUDIES
• A Collection of weird and wonderful XSS and CSRF attacks

There is no prerequisite for taking this course. However, it is strongly recommended that a candidate has more than three years of experience and/or equivalent certifications/courses

Upon successful completion of the course, delegates will receive a certificate of completion, acknowledging their proficiency in the subject matter.

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?