Web App Penetration Testing Course
Web applications play a vital role in every modern organization. But, if your organization does not properly test and secure its web apps, adversaries can compromise these applications, damage business functionality, and steal data. Unfortunately, many organizations operate under the mistaken impression that a web application security scanner will reliably discover flaws in their systems.
With this course I aim to help students move beyond push-button scanning to professional, thorough, high-value web application penetration testing.
I am sharing this course because I believe knowledge should be free or at least affordable. You should not have to get a loan on your house to get the seven thousand dollars it took to get the knowledge from this course.
This was a six day course. Which I have the audio and study material too. It is insane to cram all this information into a six day course and think that all the information has been retained.
So what we are going to do is turn this into a six week course. I will share one section a week. I would advise you to open the study material and then play the .MP3 audio files and follow along on your study material which comes in .PDF format.
Week 1: Introduction and Information Gathering
Topics:
- Overview of the web from a penetration tester’s perspective
- Exploring the various servers and clients
- Discussion of the various web architectures
- Discovering how session state works
- Discussion of the different types of vulnerabilities
- WHOIS and DNS reconnaissance
- The HTTP protocol
- WebSocket
- Secure Sockets Layer (SSL) configurations and weaknesses
- Heartbleed exploitation
- Utilizing the Burp Suite in web app penetration testing
- Week 1: Study Material Download
Week 2: Configuration, Identity, and Authentication Testing
Topics:
- Scanning with Nmap
- Discovering the infrastructure within the application
- Identifying the machines and operating systems
- Exploring virtual hosting and its impact on testing
- Learning methods to identify load balancers
- Software configuration discovery
- Learning tools to spider a website
- Brute forcing unlinked files and directories
- Discovering and exploiting Shellshock
- Web authentication
- Username harvesting and password guessing
- Fuzzing
- Burp Intruder
- Week 2: Study Material Download
Week 3: Injection
Topics:
- Session tracking
- Authentication bypass flaws
- Mutillidae
- Command Injection
- Directory traversal
- Local File Inclusion (LFI)
- Remote File Inclusion (RFI)
- SQL injection
- Blind SQL injection
- Error-based SQL injection
- Exploiting SQL injection
- SQL injection tools
- Sqlmap
- Week 3: Study Material
Week 4: XXE and XSS
Topics:
- XML External Entity (XXE)
- Cross-Site Scripting (XSS)
- Browser Exploitation Framework (BeEF)
- AJAX
- XML and JSON
- Document Object Model (DOM)
- Logic attacks
- API attacks
- Data attacks
- Week 4: Study Material
Week 5: CSRF, Logic Flaws and Advanced Tools
- Cross-Site Request Forgery (CSRF)
- Python for web app penetration testing
- WPScan
- w3af
- Metasploit for web penetration testers
- Leveraging attacks to gain access to the system
- How to pivot our attacks through a web application
- Exploiting applications to steal cookies
- Executing commands through web application vulnerabilities
- When tools fail
- Week 5: Study Material