Web Application Hacking (Penetration Testing) 5-day Hands-On Course



Similar documents
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

(WAPT) Web Application Penetration Testing

Criteria for web application security check. Version

Application Security Testing

Learn Ethical Hacking, Become a Pentester

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Chapter 1 Web Application (In)security 1

Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS

elearning for Secure Application Development

Intrusion detection for web applications

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Enterprise Application Security Workshop Series

Vulnerability Assessment and Penetration Testing

Attack Vector Detail Report Atlassian

Web Application Report

CYBERTRON NETWORK SOLUTIONS

Last update: February 23, 2004

Executive Summary On IronWASP

Web Application Security

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

Spigit, Inc. Web Application Vulnerability Assessment/Penetration Test. Prepared By: Accuvant LABS


Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3

The Top Web Application Attacks: Are you vulnerable?

Where every interaction matters.

Penetration Testing with Kali Linux

SENSITIVE AUSTRALIAN SPORTS COMMISSION ATHLETE MANAGEMENT SYSTEM (AMS) SMARTBASE SECURITY TEST PLAN. Final. Version 1.0

JVA-122. Secure Java Web Development

Application Security Testing. Generic Test Strategy

Hack Proof Your Webapps

MANAGED SECURITY TESTING

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Web App Security Audit Services

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Web Application Vulnerability Testing with Nessus

Check list for web developers

Adobe Systems Incorporated

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

What is Web Security? Motivation

Essential IT Security Testing

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

Ruby on Rails Secure Coding Recommendations

Web Security Testing Cookbook*

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Web application testing

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Web application security

Cross-Site Scripting

Certified Secure Web Application Security Test Checklist

OWASP Top Ten Tools and Tactics

CRYPTUS DIPLOMA IN IT SECURITY

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Web Application Penetration Testing

OWASP AND APPLICATION SECURITY

Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia

VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso

Guidelines for Web applications protection with dedicated Web Application Firewall

Web Application Firewalls Evaluation and Analysis. University of Amsterdam System & Network Engineering MSc

Web Application Security

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Security vulnerabilities in new web applications. Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Professional Penetration Testing Techniques and Vulnerability Assessment ...

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Web-Application Security

Web Application Security

APPLICATION SECURITY AND ITS IMPORTANCE

Secure development and the SDLC. Presented By Jerry

Web Application Attacks And WAF Evasion

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Advanced Web Technology 10) XSS, CSRF and SQL Injection 2

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Application Security Vulnerabilities, Mitigation, and Consequences

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)

Overview of the Penetration Test Implementation and Service. Peter Kanters

Application security testing: Protecting your application and data

Web Application Security

Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0

Transcription:

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis and the next security breach is just a matter of time. This intensive hands-on course will teach you how to find those vulnerabilities in your web applications before the bad guys do. The course will introduce the various methods, tools and techniques used by attackers, in order to know how to test for the major security vulnerabilities and how to identify security bugs on real systems, by using live hacking demonstrations and hands-on labs. The objectives of the course are to teach developers and security professionals about the most dangerous vulnerabilities and how to perform security testing, and by that increasing the amount and quality of test cases that can be performed by the auditor. This course provides intensive hands-on labs using real world applications. Target Audience Members of the software development team: Security professionals Software experts Experienced developers Prerequisites Before attending this course, students should be familiar with: Operating systems concepts, basic knowledge in databases & SQL language Programming concepts, with emphasis on web applications (HTML/JS) P a g e 1

Course topics Day 1 Information Gathering Application discovery Site mapping & web crawling Server & application fingerprinting Identifying the entry points File extensions handling Page enumeration and brute forcing Looking for leftovers Google hacking Analysis of error code LAB Collect information and reveal application's sensitive data Injections and Validations Encoding attacks Command injection Code injection LDAP injection Log / CRLF injection Header injection SMTP injection XML injection XPATH injection Input validation techniques Blacklist VS. Whitelist input validation bypassing LAB Exploit improper input validation P a g e 2

Day 2 Authentication Vulnerabilities What is authentication? Supported authentication types - anonymous, basic, digest, forms, Kerberos, client certificate Authentication scenarios User enumeration Guessing passwords - brute force & dictionary attacks Direct page requests Parameter modification Password reset flaws Password change flaws Bypassing weak CAPTCHA mechanisms Common implementation mistakes - authentication bypassing using SQL injection, LDAP injection, XPATH injection LAB Bypass authentication forms using multiple method Authorization Vulnerabilities What is authorization? Authorization models - DAC/MAC RBAC Authorization bypassing Canonicalization & path traversal Parameter tampering Forceful browsing Rendering based authorization Client side validation attacks Hardening LAB - Authorization bypassing and impersonation Business Logic Vulnerabilities Business flow bypass Replay attack Currency manipulation Business logic attack vectors Direct access to web services LAB Exploit business logic vulnerabilities P a g e 3

Day 3 SQL Injection Vulnerabilities Introduction to SQL command structure NoSQL injection Mongo, ORM Database manipulation Circumventing authentication Retrieving data Inserting data Deleting data Attacking availability Local system access Discovering vulnerable apps Error based Blind Binary search Evasion LAB Practice SQL injection attacks File Handling Attacks Path traversal Canonicalization Uploaded file backdoors Insecure file extension handling Directory listing File size File type Malware upload LAB Exploit insecure file handling, upload web shells, deface using upload file mechanism P a g e 4

Day 4 Cross Site Scripting (XSS) Vulnerabilities Overview of XSS XSS Description Reflected XSS Stored / persistent XSS DOM based XSS XSS Whitelist VS. Blacklist input validation Discovery approaches Manual VS. Automatic VS. Semi-automatic Different XSS scenarios XSS input validation evasion LAB Perform XSS attacks Browser Manipulation Techniques CSRF (Cross Site Request Forgery) Clickjacking Open redirects HTTP response splitting LAB Perform actions on-behalf users by CSRF, Test websites for Click jacking P a g e 5

Day 5 Cryptography Pitfalls Symmetric cryptography Asymmetric cryptography Hashing Digital signing PKI / certificate SSL protocol SSL cipher suite Insufficient transport layer protection LAB Cryptography lab Application Denial Of Service (DoS) Vulnerabilities Application / OS crash CPU starvation Memory starvation File system starvation Resource starvation Triggering high network bandwidth User level DoS Exploiting a specific vulnerability Zip bomb Over flows redos Parsing errors LAB - Application DoS Attacking Client Side Applications HTML5 approach Client side attacks Analyze client side source code Insecure storage Flash decompile Crossdomain.xml CORS requests Lab Client site application hacking P a g e 6