Course Summary
This course familiarises you with a wealth of tools and techniques required to breach and compromise the security of web applications.
The course starts by discussing the very basics of web application concepts, and gradually builds up to a level where you can not only use the tools and techniques to hack various components involved in a web application, but also walk away with a solid understanding of the concepts on which these tools are based.
The course will also talk about industry standards such as OWASP Top 10 and PCI DSS which form a critical part of web application security. Numerous real life examples will be discussed during the course to help you understand the true impact of these vulnerabilities.
Trained delegates can:
• Confidently articulate the intricacies of the HTTP protocol and how it can be manipulated to achieve a malicious goal.
• Understand how to use industry-standard tools, such as Burpsuite, to perform manual penetration testing against web applications.
• Find and exploit vulnerabilities in web applications, including those that would lead to injection attacks, authorisation and bypass authentication, malicious file uploads, and more.
• Identify the infrastructure and frameworks underlying a web attack surface.
• Understand complications related to cryptography and the effect on web applications.
• Understand how to tie security testing and other offensive and defensive measures back to authentic attack vectors.
UNDERSTANDING THE HTTP PROTOCOL
• HTTP Protocol Basics
• Introduction to proxy tools
INFORMATION GATHERING
• Enumeration Techniques
• Understanding Web Attack surface
USERNAME ENUMERATION & FAULTY PASSWORD RESET
• Attacking Authentication and Faulty Password mechanisms
AUTHORIZATION BYPASS
• Logical Bypass techniques
• Session related issues
CROSS SITE SCRIPTING (XSS)
• Various types of XSS
• Session Hijacking & other attacks
ISSUES WITH SSL / TLS
• SSL/TLS misconfiguration
CROSS SITE REQUEST FORGERY (CSRF)
• Understanding CSRF attack
• Various impacts of SSRF attack
SQL INJECTION
• SQL Injection types
• Manual Exploitation
XML EXTERNAL ENTITY (XXE) ATTACKS
• XXE Basics
• XXE exploitation
INSECURE FILE UPLOADS
• Attacking File upload functionality
DESERIALIZATION VULNERABILITIES
• Serialization Basics
• PHP Deserialization Attack
INSECURE FILE UPLOADS
• Attacking File upload functionality
COMPONENTS WITH KNOWN VULNERABILITIES
• Understanding risks known vulnerabilities
• Known vulnerabilities leading to critical exploits
INSUFFICIENT LOGGING AND MONITORING
• Understanding importance of logging and monitoring
• Common pitfalls in logging and monitoring
MISCELLANEOUS
• Understanding formula Injection attack
• Understanding Open Redirection attack
Other Popular Courses
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Intermediate
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM