Web Application Hacking and Security – WAHS
Web Application Hacking and Security WAHS has challenges derived from the iLab environments of EC Council – from Certified Ethical Hacker (C|EH) to the Certified Penetration Testing Professional (C|PENT); from Certified Application Security Engineer (C|ASE) .Net to Java. But Web …
Overview
Web Application Hacking and Security WAHS has challenges derived from the iLab environments of EC Council – from Certified Ethical Hacker (C|EH) to the Certified Penetration Testing Professional (C|PENT); from Certified Application Security Engineer (C|ASE) .Net to Java. But Web Application Hacking and Security goes beyond this to more difficult scenarios as you advance through each problem.
Web Application Hacking and Security is like Capture-The-Flag (CTF) competitions meant to test your hacking skills. But you can keep on trying until you achieve the goal. Test your skills and work alone to solve complex problems or follow the instructor as he does walkthroughs to help you learn Web Application Hacking and Security.
Play > Learn > Hack > Test
WHAT WILL YOU LEARN?
You will learn about application vulnerabilities and web application hacking. Even though this will prove useful for other CTF contests, and in cracking VVMs, it will be even more useful to your career as you learn to defend your applications and progress to Web Application Hacking and Security.
- Advanced Web Application Penetration Testing
- Advanced SQL Injection (SQLi)
- Reflected, Stored and DOM-based Cross Site
- Scripting (XSS)
- Cross Site Request Forgery (CSRF) – GET and
- POST Methods
- Server-Side Request Forgery (SSRF)
- Security Misconfigurations
- Directory Browsing/Bruteforcing
- CMS Vulnerability Scanning
- Network Scanning
- Auth Bypass
- Web App Enumeration
- Dictionary Attack
- Insecure Direct Object Reference Prevention (IDOR)
- Broken Access Control
- Local File Inclusion (LFI)
Advantages of WAHS Certification
✓ Learn the various techniques for enumerating and exploiting web applications.
✓ Learn tools and techniques to automate web application penetration testing.
✓To understand how to develop and get rid of most common web application attacks.
Target Audience
✓ Web Application Penetration Tester
✓ Security Engineer
✓ Vulnerability Analysts
✓ Ethical Hackers
✓ Information Security Engineers
Prerequisites
- Good understanding of web application working
- Basic working knowledge of the Linux command line
- Basic knowledge of OSes and file systems
- Basic knowledge of Bash and/or Python scripting
Complete Walkthrough Instruction & Challenge Based Environment
Unlike many Capture-the-Flag challenges and Vulnerable Virtual Machines, Web Application Hacking and Security provides the challenger with the ability to follow an instructor as they make their way through the challenges. The instructor will present alternatives, do scans, upload malicious payloads, and crack passwords from their home computer just like you. – But don’t rely on the walkthrough; challenge yourself and see how far you can get. Play some of the walkthroughs, then pause and try some more. In the process, you will learn about application vulnerabilities and web application hacking. Even though this will prove useful for other CTF contests, and in cracking VVMs, it will be even more useful to your career as you learn to defend your applications and progress to Web Application Hacking and Security.
You will encounter security misconfigurations, SQL injection vulnerabilities, directory browsing vulnerabilities, enumeration vulnerabilities, and opportunities to escalate privileges and gain access to privileged information.
Each section of ‘Break the Code’ brings progressively more difficult challenges. There are always multiple paths to take, but few will get you the prize and move up the leader board.
Course Syllabus
Module : 1. Advanced Web Application Penetration Testing
Module : 2. Advanced SQL Injection (SQLi)
Module : 3. Reflected, Stored and DOM-based Cross Site Scripting (XSS)
Module : 4. Cross Site Request Forgery (CSRF) – GET and POST Methods
Module : 5. Server-Side Request Forgery (SSRF)
Module : 6. Security Misconfigurations
Module : 7. Directory Browsing/Bruteforcing
Module : 8. CMS Vulnerability Scanning
Module : 9. Network Scanning
Module : 10. Auth Bypass
Module : 11. Web App Enumeration
Module : 12. Dictionary Attack
Module : 13. Insecure Direct Object Reference Prevention (IDOR)
Module : 14. Broken Access Control
Module : 15. Local File Inclusion (LFI)
Module : 16. Remote File Inclusion (RFI)
Module : 17. Arbitrary File Download
Module : 18. Arbitrary File Upload
Module : 19. Using Components with Known Vulnerabilities
Module : 20. Command Injection
Module : 21. Remote Code Execution
Module : 22. File Tampering
Module : 23. Privilege Escalation
Module : 24. Log Poisoning
Module : 25. Weak SSL Ciphers
Module : 26. Cookie Modification
Module : 27. Source Code Analysis
Module : 28. HTTP Header modification
Module : 29. Session Fixation
Module : 30. Clickjacking