Hack2Secure Web Application Security Testing Workshop Reference Guide
Hack2Secure Web Application Security Testing Workshop Reference Guide
Hack2Secure Web Application Security Testing Workshop Reference Guide
www.hack2secure.com | [email protected]
Hack2Secure Web Application Security Testing Workshop: Reference Guide 1
Table of Content
www.hack2secure.com | [email protected]
Hack2Secure Web Application Security Testing Workshop: Reference Guide 2
Hack2Secures Workshop on Web Application Security Testing provides hands-on exposure using both
Real-Time scenarios and Simulated Lab environment to required Tools and Techniques on different Web
Security Risk and Attack vectors.
Scoped around OWASP Web Application Security Testing Guide, these intensive practical sessions
provides deep-dive on required practical tips and tricks to evaluate, test and assess Security of Web
Application.
Student Student
WORKSHOP CURRICULUM
Module#1: Building the Base Scoped LAB
[Concepts, Processes & Methodologies] WHOIS analysis
Understanding the Web DNS Scan with Nslookup, DNSRecon, NMAP DNS
Importance of Web Application Security related NSE Scripts
Web 2.0 & Related Concerns Metasploit for DNS Scan
Web Application Security Testing (WAST): Google Filters & Hacking Database
Current Approach Setting-up Lab for Deep-Web exploration
Web Application Penetration Testing (WAPT): SHODAN to explore Devices on Network
Approach TheHarvester & Recon-Ng for Information
Introducing Web Proxies: Burp Suite & ZAP Gathering
HTTP Protocol HTtrack for Website Mirroring
o History, Versions
o Request Methods, Status Codes Module#3: Looking for Entry Point
Web Sockets: Introduction [Scanning, Fingerprinting & Spidering]
HTTPS Protocol Scanning: Identifying Services & Configurations
o Introduction Fingerprinting Web Server
o SSL/TLS handshake, Testing Methods Software Configuration level flaws
o Vulnerability Case Study: HeartBleed Vulnerability Case Study: ShellShock
OWASP Web Application Security Testing Guide: Spidering/Crawling
Walkthrough Fuzzing:
OWASP Top10 Web Application Security Risk: o About, What to Look for
Walkthrough Directory Browsing
Scoped LAB Scoped LAB
Walkthrough BurpSuite & ZAP interfaces Exploring NMAP for different Scan Options
Using BurpSuite to analyse HTTP Request & Testing HTTP methods with Netcat
Response Server Scan with Nikto
SSL Handshake Analysis with Wireshark Testing Shekkshock Vulnerability
SSL/TLS Security Testing using OpenSSL, SSLScan Burp Suite (Spidering), Wappalyzer, CeWL
and NMAP SSL related Scripts Fuzzing with FuzzDB & Burp Suite (Intruder) to
Testing HeartBleed Vulnerability explore Files & Locations
Using Dirbuster & ZAP to explore hidden
Module#2: Casual Leakage Points Directories
[Reconnaissance] Google to Search hidden Public directories
Why Information Gathering
DNS Protocol: Module#4: Analysing A.A.A. Concerns
o Overview, Working, Zone Transfers About Authentication, Different Schemes
Open Source Intelligence Username Harvesting
Exploring Google Search Side Channel & Timing Attacks
o Keywords & Filters Browser Cache Weakness
Google Hacking Database (GHDB) Cracking Weak Passwords
Exploring Deep-Web Single Sign-On
Information Leakage from Public Sources About Authorization
Website Mirroring Insecure Direct Object References
Directory Traversal Attacks Using BBQSQL & SQLMAP for exploiting SQLi
About Accountability flaw
Error Code Analysis Using Havij for SQLi
Security best Practices for A.A.A.
Scoped LAB Module#8: Cross Site Scripting (XSS)
Using ZAP to explore different Authentication Document Object Model (DOM)
Schemes and Username harvesting XSS
Brute Forcing Weak Passwords o Overview, How it Works, Types
Exploiting Insure Direct Object References o Testing Methods, Attack Scope
Exploiting Directory Traversal Vulnerability Same Origin Policy
HTML Injection
Module#5: Session Management XSS with POST
Stateless Nature of HTTP AJAX
Introducing Sessions & Tracking Methods o Overview, XMLHttpRequest, Mash-Ups
Session Tokens or SessionID o Libraries/Frameworks & related Flaws
o Analysis & Exploring Randomness o Exploring Attack Surfaces
Session Fixation & Hijacking JSON
Session Tampering, Splitting & Smuggling o Overview, Attacks
Securing Cookies: Flags & Attributes o XSS on AJAX JSON Objects
Cross Site Request Forgery Scoped LAB
Scoped LAB XSSer, XSSsniper, XSScrapy, BeEF to explore XSS
Using Burp Suite (Sequencer) to analyse Session Vulnerability
Randomness Using Burp Suite (Intruder) to Fuzz with XSS
Exploring Session Tampering, Fixation & Inputs
Hijacking Attacks Exploring HTML Injection
Exploring Session Splitting & Smuggling Attacks Exploring XSS in AJAX & JSON Objects
Use Case of Secure Cookie Flags & Attributes
XSRF Attack demonstration Module#9: Buffer Overflow Attacks
Heap & Stack Overflow
Module#6: Python & Java Script for Pen- Format String Vulnerabilities [LAB]
Testers
Python & Java Script: Primer Module#10: Scanners & Frameworks
Crafting HTTP Request & Attack scenarios with W3af [LAB]
Python & Java Script [LAB] Metasploit Framework [LAB]
Globally Available | Proctored | 180 mins | 90 MCQ | Passing Grade: 60% | Exam Language: English
Web Application Security Defender (WASD) Certificate program evaluates individual's implementation level
skills required for Web Application Security Assessment. This program ensures candidate's awareness on
Application Security Challenges, Risk, Tools, Techniques and methodologies along with hands-on practical level
knowledge and skill-sets.
WASD is based on Application Security Industry Standards and Best Practices and ensures Knowledge and
Understanding of Secure Web Application Assessment requirements. It walks through different
phases/domains of Application Security Testing and provide required practical strategies and methodologies
to evaluate Security at every level.
What Other Exams, apart from WASD I can appear after attending this program?
This workshop is scoped around OWASP Web Application Security Testing guide, which is the primary base
for most of (Vendor Independent) Web Application Security Certification programs like GIACs Web
Application Pentester (GWAPT) etc. From GWAPT prospect, this Web Application Security Testing program
is designed to cover almost all sections and topics as per exam curriculum.
What is the Scope of this Program? Which Web Security Tools I can expect to learn as a
part of curriculum?
As mentioned earlier, this workshop is scoped around OWASP Web Application Security Testing Guide. It
also covers OWASP Top10 Web Application Security Risk from analysis, Testing and defense best practices
prospect.
This program primarily utilizes tools like Burp Suite, Zed Attack Proxy (ZAP), Nmap, Metasploit Framework
(from Web Security prospect), FuzzDb, Nikto, W3af, SQLMAP, XSSer, BeEF etc along with number of other
Web Security Assessment Scripts & Tools.
About Hack2Secure
Hack2Secure
Inspire, Induce, Innovate
The IT Industry has evolved from a standalone desktop and independent applications to a Complex Cloud
environment. Today technology have become so advanced to reduce costs in terms of hardware, software,
development and maintenance, however this has created an increased risk to SECURITY.
Hack2Secure excels in Information Security Domain and offers customised IT Security programs, including
Training, Services and Solutions. Our programs are designed by industry experts and tailored as per specific
needs. We strive to serve with quality, efficiency, and timely delivery through our team of experienced and
certified professionals in Information Security. We help students, professionals and companies with
knowledge, tools and guidance required to be at forefront of a vital and rapidly changing IT industry.
Security Training
Vendor Independent, Customizable, Across Domains, Multiple Levels
Hack2Secure excels in delivering intensive, immersion security training sessions designed to master
practical steps necessary for defending systems against the dangerous security threats. Our wide range of
fully customizable training courses allow individual to master different aspects of Information Security as
per their industry requirement and convenience.
Security Certification
Globally delivered and Proctored Security Certification programs with PearsonVUE
Vendor Independent Programs based on Industry Security Standards and Practices
[email protected] @hack2secure
Hack2Secure, #681, First Floor, 15th Cross, 8th Main, 2nd Phase,
J.P. Nagar, Bangalore, Karnataka, 560078