PEN600 Advanced Web Application Exploitation

PEN600 Advanced Web Application Exploitation

$499.00

Course Overview Web applications are the source of many security vulnerabilities. Because of this, many web developers try to lock down the security of their web applications. However, not all of them do it correctly or completely, leaving certain avenues of attack still open. The Advanced Web Exploitation course explores how to search for, find, and exploit these hard to find vulnerabilities. Each module will have video lecture content, explaining how to evade common incomplete mitigation strategies and how to find and exploit difficult vulnerabilities. Each module will also have a hands-on lab component, in which the students will have the chance to experiment with advanced techniques, seeing why they work and how they can be modified in whatever unique situation is encountered. Students will then complete a capstone lab that will allow the student to explore a novel web application and perform a multistep attack to exploit it completely. At the end of this course, students will understand the shortcomings of incomplete fixes to these vulnerabilities. They will also understand how these vulnerabilities might manifest themselves and how to modify their attack strategy to compensate. Objectives Evade common incomplete filters to achieve the basic attacks String multiple attacks together to achieve a more difficult objective Prerequisite Knowledge Before taking this course, students should be familiar with: Identify basic examples of the OWASP Top Ten vulnerabilities Exploit the basic manifestations of these vulnerabilities Estimated Course Length: 24 hours Module Lecture Labs Estimated Completion Time (minutes) 0 Introduction 5 1 Basic Recon Tools Lab 1: Recon Tools 60 2 Advanced SQL Injection Lab 2.1: Detecting and Exploiting Hard to Find SQL Injection Vulnerabilities Lab 2.2: Advanced SQLmap Lab 2.3: Manual Blind SQL Injection Lab 2.4: NOSQL Injection 300 3 XSS Filter Evasion Lab 3.1: XSS Filter Evasion Lab 3.2: Exploiting Misconfigured CORS 120 4 OS Command Injection Filter Evasion Lab 4: OS Command Injection Filter Evasion 90 5 Local File Inclusion Lab 5: Advanced Local File Inclusion 90 6 Cross Site Request Forgery Lab 6: Advanced Cross Site Request Forgery 90 7 XML External Entities Lab 7.1: XXE to Obtain Arbitrary Files Lab 7.2: Out Of Band XXE 120 8 Server Side Request Forgery Lab 8: SSRF for Internal Port Scanning and File Disclosure 90 9 Insecure Deserialization Lab 9: Exploiting Insecure Deserialization in Java and Python 90 10 Capstone Lab 10: Capstone: Multistage Attack on a Partially Hardened Web Application 480 Total: 24 hours

Show More Show Less