Back to All Events

Advanced Web Hacking - Black Belt Edition

Special Price


Ends on Oct 1st


Three Days:

This class talks about a wealth of hacking techniques to compromise web applications, APIs and associated end-points. This class focus on specific areas of app-sec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). The class allows attendees to practice some neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs.

The vulnerabilities selected for the class either typically go undetected by modern scanners or the exploitation techniques are not so well known. Attendees can also benefit from a state-of-art Hacklab and we can provide 30 days lab access after the class to allow attendees more practice time.

This fast-paced class, gives attendees an insight into Advanced Web Hacking, the team has built a state of the art hacklab and recreated security vulnerabilities based on real life Pen Tests and real bug bounties seen in the wild.

Authentication Bypass

  • Logical Bypass / Boundary Conditions

  • Bypassing 2 Factor Authentication

  • Authentication Bypass using Subdomain Takeover

  • JWT Token Brute-Force attacks

  • SAML Authorization Bypass

  • Auth bypass using .NET Machine Key / Pre-shared Key

Password Reset Attacks

  • Cookie Swap

  • Host Header Validation Bypass 

  • Case study of popular password reset fails.

Business Logic Flaws / Authorization flaws

  • Mass Assignment

  • Invite/Promo Code Bypass

  • Replay Attack

  • API Authorisation Bypass

  • HTTP Parameter Pollution (HPP)

XML External Entity (XXE) Attack

  • XXE Basics

  • Advanced XXE Exploitation over OOB channels

  • XXE through SAML

  • XXE in File Parsing

Breaking Crypto

  • Known Plaintext Attack (Faulty Password Reset)

  • Padding Oracle Attack

  • Hash length extension attacks

Remote Code Execution (RCE)

  • Java Serialisation Attack

  • .Net Serialisation Attack

  • Node.js Serialization Attack

  • PHP Serialization Attack

  • JSON Serialization Attack

  • Server Side Template Injection

  • Exploiting code injection over OOB channel

SQL Injection

  • 2nd order injection

  • Out-of-Band exploitation

  • SQLi through crypto

  • OS code exec via powershell.

  • Advanced topics in SQli

  • Advanced SQLMap Usage and WAF bypass

  • Unrestricted File Upload

  • Malicious File Extensions 

  • Circumventing File validation checks 

  • Exploiting hardened web servers.

Pentesting CMS

  • Identifying and attacking various CMS

  • Attacking Hardened WordPress and other CMS

Server Side Request Forgery (SSRF)

  • SSRF to query internal network

  • SSRF to call internal files

  • SSRF to RCE (Cloud case study) 

Attacking the Cloud

  • Serverless exploitation

  • Post Exploitation techniques on Cloud hosted applications

  • Various Case Studies

  • Client Side Attacks

  • Blind XSS

  • Self XSS

  • CSP bypass

  • Various Case Studies on advanced XSS and CSRF attacks

Web Caching Attacks

Exploring and Attacking GraphQL

Attack Chaining N tier vulnerability Chaining leading to RCE.


Who Should Take This Class?

This is not a beginner class and attendees are expected to have a good prior understanding of the OWASP top 10 issues to gain maximum value from the class.  Further to this, the class does not cover all AppSec topics and focuses only on advanced identification and exploitation techniques of the vulnerabilities shown on the right. Whoever works with or against the security of modern web applications will enjoy and benefit from this class. 

Three Day Course

PURCHASE: $2,195

Includes Community Ticket to “Texas Cyber Summit” October 10th-12th, 2019

Later Event: October 8
AppSec for Developers