Web Application Hacking
This hands-on course teaches the student the fundamentals of how applications are built and where vulnerabilities are introduced in the development process. Designed for those new to penetration testing, network administrators or who want to understand more about offensive testing by breaking into various networks and applications, this course covers both the OWASP Top 10 and the OWASP Application Security Verification Standard.
This is an entry-level to intermediate Web Application hacking course. This course is a mix of theory and practical, with approximately 25 hands-on labs, hosted in a cloud environment where each student gets their own lab. The labs have a mix of guided exercises for beginners, and more advanced practicals for experienced participants. Theory sections focus on understanding why the vulnerability exists and the fundamental technologies that underpin it, encouraging a "learn the trade not the trick" approach.
The cloud-based lab allows for students to interactively exploit a variety of vulnerabilities in a real world environment, ranging from simple parameter tampering to XSS, CSRF, LFI, SQLi, IDOR. While the course covers easy to exploit vulnerabilities, students are also given the opportunity to practically explore more intermediate topics such as cracking and resigning JWT tokens, decompiling DLL and WebAssembly files, and executing Java Deserialisation and Cache poisoning attacks. The practicals also covers chained vulnerabilities, with automated bots that can be targeted for XSS and CSRF attack chains. Students will also receive access to the SensePost training portal, which contains all of the resources required for the course. Each of the practical exercises contain a number of guiding questions, along with well documented answers that ensure that students do not fall behind.
This course is ideally suited to aspiring penetration testers that wish to learn how to test web applications for common vulnerabilities, or for defenders, developers and administrators looking to better understand how to defend their applications.
- Learn the fundamentals of HTTP, such as how GET and POST requests work, and how state can be maintained by using cookies.
- Learn how intercepting proxies work, as well as how to use Burp Suite's Proxy Intercept, HTTP History, Repeater, Intruder, Decoder and other functionality.
- Learn the difference between client side and server side security controls, and the issues with each.
- Learn how to enumerate web applications, find vulnerabilities or sensitive information and pages that can be used in further exploitation.
- Learn various web based vulnerabilities, their effects, how to practically exploit them, as well as how to remediate them.
Know your enemy
There’s a web application for most parts of our Internet lives and to a degree, our daily lives. With this large surface area, there’s no doubt that they are often the entry point for most breaches. If you look at some of the biggest hacks in the last 18 months, the compromises can be largely attributed to flaws in web applications.
The course focuses on the fundamentals rather than how to use specific tools. It introduces you, the student, to our hacking methodology refined over thousands of assessment conducted over the last 20 years.
Understand the landscape
SQLi/XML/XPath/LDAP/RFI/DOM, this industry loves acronyms. From the start we cut through the acronym soup and start serving up plain and simple approaches to understand how applications are built and where vulnerabilities are introduced. This is hands on learning, not just listening.
It's imporant to align with Industry Standards, and this course follows both the OWASP Top 10 and the OWASP Application Security Verification Standard (ASVS).
SensePost Training Portal
We've developed a training portal for students to interact with the trainers, keep updated on content and also download all files, slides and tools delivered during the course. This portal is made available to all students, even when the course has finished. In addition, we've moved our training infrastructure into our own cloud, which means students get their own individual environments to test against, making use of VPN's and numerous targets. This gives a fully immersive experience of attacking real-world architecture and networks.
Who should take this course?
This course is ideal for those wanting to learn how attackers are gaining access to networks, penetration testers who are new to network penetration testing, and/or those who wish to brush up on effective ways to own companies from the net and internally.
The course is also ideal for administrators who want to defend against these attacks. The hands-on nature of the course ensures that you will be familiar enough with the tools and techniques that you'll be able to verify whether your organization is vulnerable, and how to defend yourself if you are.
If you wish to have training, please get in touch with our sales team to discuss further.