Course Outline
This course offers an in-depth exploration of the most prominent aspects of web security. Participants will gain a thorough understanding of foundational concepts, advanced techniques, and real-world applications in ethical hacking and web penetration testing. Each module instills theoretical knowledge while cultivating the practical skills needed to identify and mitigate complex web application security vulnerabilities.
Upcoming Meetings
There are no upcoming meetings for this course. Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.comModules
Web Fundamentals & Assessment Methodologies
- Web Technologies Overview
- Browser Tools & Debugging
- WASP Top10
- Web Application Assessment Methodologies
- The Penetration Tester’s Toolkit
Interception Proxies & SSL Configurations
- HTTP vs. HTTPS
- AJAX
- SSL vs. TLS
- Cipher Suites
- OpenSSL – CA vs. Self-Signed Certificates
- HTTP Cookies Burp Suite
- OWASP Zap
- Proxying SSL Through BurpSuite
Traffic Manipulation & Reconnaissance
- Web Site Enumeration
- Web Application Brute-Force Challenge
- DNS Reconnaissance
- Virtual Host Discovery
- Open-Source Intelligence (OSINT)
Client-Side Attacks & XSS
- Cross-Site Scripting (XSS)
- Reflected XSS
- Stored XSS
- Document Object Model (DOM)
- DOM XSS
Advanced Injection Attacks
- SQL Injection (including Blind and Error-based)
- Error-Based SQL Injection
- Union-Based SQL Injection
- Command Injection
- Directory Traversal
- SQL Injection Tools: sqlmap
XML, JSON, & API Attacks
- XML Usage in Web Applications
- XXE
- SSRF
- SSRF through XXE
- XML and JSON
- REST and SOAP
- API Attacks
Authentication, Authorization, & CSRF
- CSRF
- Broken Authentication
- Broken Authorization
- Session Attacks
Advanced Techniques & Tools
- PHP Vulnerabilities
- LFI/RFI & Directory Traversal
- File Upload (PHP Shells, Nessus, Qualys)
- Python for Web App Penetration Testing
- WordPress Hacking (Content Management Systems, WPScan)
- ExploitDB
Business of Penetration Testing
- Preparation
- Post Assessment and Reporting
- Writing Reports
- Nessus
- Qualys
Prerequisites
- Basic understanding of web technologies
- Familiarity with programming concepts, with a focus on JavaScript
- Knowledge of networking fundamentals
- Understanding of cybersecurity basics
Upcoming Meetings
There are no upcoming meetings for this course. Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.comParticipants will be introduced to many techniques used by pentesters and learn how to check for most security vulnerabilities"Download Full Syllabus