Ends on June 30
This class talks about a wealth of hacking techniques to compromise web applications, APIs and associated end-points. This class focus on specific areas of app-sec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). The class allows attendees to practice some neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs.
The vulnerabilities selected for the class either typically go undetected by modern scanners or the exploitation techniques are not so well known. Attendees can also benefit from a state-of-art Hacklab and we can provide 30 days lab access after the class to allow attendees more practice time.
This fast-paced class, gives attendees an insight into Advanced Web Hacking, the team has built a state of the art hacklab and recreated security vulnerabilities based on real life Pen Tests and real bug bounties seen in the wild.
Logical Bypass / Boundary Conditions
Bypassing 2 Factor Authentication
Authentication Bypass using Subdomain Takeover
JWT Token Brute-Force attacks
SAML Authorization Bypass
Auth bypass using .NET Machine Key / Pre-shared Key
Password Reset Attacks
Host Header Validation Bypass
Case study of popular password reset fails.
Business Logic Flaws / Authorization flaws
Invite/Promo Code Bypass
API Authorisation Bypass
HTTP Parameter Pollution (HPP)
XML External Entity (XXE) Attack
Advanced XXE Exploitation over OOB channels
XXE through SAML
XXE in File Parsing
Known Plaintext Attack (Faulty Password Reset)
Padding Oracle Attack
Hash length extension attacks
Remote Code Execution (RCE)
Java Serialisation Attack
.Net Serialisation Attack
Node.js Serialization Attack
PHP Serialization Attack
JSON Serialization Attack
Server Side Template Injection
Exploiting code injection over OOB channel
2nd order injection
SQLi through crypto
OS code exec via powershell.
Advanced topics in SQli
Advanced SQLMap Usage and WAF bypass
Unrestricted File Upload
Malicious File Extensions
Circumventing File validation checks
Exploiting hardened web servers.
Identifying and attacking various CMS
Attacking Hardened WordPress and other CMS
Server Side Request Forgery (SSRF)
SSRF to query internal network
SSRF to call internal files
SSRF to RCE (Cloud case study)
Attacking the Cloud
Post Exploitation techniques on Cloud hosted applications
Various Case Studies
Client Side Attacks
Various Case Studies on advanced XSS and CSRF attacks
Web Caching Attacks
Exploring and Attacking GraphQL
Attack Chaining N tier vulnerability Chaining leading to RCE.
Who Should Take This Class?
This is not a beginner class and attendees are expected to have a good prior understanding of the OWASP top 10 issues to gain maximum value from the class. Further to this, the class does not cover all AppSec topics and focuses only on advanced identification and exploitation techniques of the vulnerabilities shown on the right. Whoever works with or against the security of modern web applications will enjoy and benefit from this class.
Three Day Course