Web Application Penetration Testing Course
Penetration Testing Courses

Web Application Penetration Testing Course
Penetration Testing and Web Security Testing (WST) are security testing systems for security vulnerabilities or security breaches of enterprise sites and Web applications. These vulnerabilities could lead to abuse on websites.
In this intrusion testing and web security course, participants learn to understand real-world Web applications and, most importantly, gain knowledge of a proven, repeatable process for reliably detecting them.
Even technology-savvy security professionals often struggle to help businesses understand the risks of their business. Much of the art of intrusion testing has less to do with the intrusion of opponents than the belief of an organization to take the risk seriously and take the appropriate countermeasures.

Course 1– Web and Server Technology
- Basic concepts of web applications, how they work and the HTTP protocol
- HTML basics part 1
- HTML basics part 2
- Difference between static and dynamic website
- HTTP protocol Understanding
- Parts of HTTP Request
- Parts of HTTP Response
- Various HTTP Methods
- Understanding URLS
- Intro to REST
- HTTP Request & Response Headers
- What is a cookie
- HTTP Status codes
- HTTP Proxy
- Authentication with HTTP
- HTTP basic and digest authentication
- What is “Server-Side”
- Server and client side with example
- What is a session
- Introduction to UTF-8 and Unicode
- URL encoding
- HTML encoding
- Base64 encoding
- Hex encoding & ASCII
Course 2 – Setting up the lab with BurpSuite and bWAPP
- Setup lab with bWAPP
- Set up Burp Suite
- Configure Firefox and add certificate
- Mapping and scoping website
- Spidering
- Active and passive scanning
- Scanner options and demo
- Introduction to password security
- Intruder
- Intruder attack types
- Payload settings
- Intruder settings
Web Application Security LAB
- Penetration testing tool
- Environment Setup
- General concept
- Proxy module
- Repeater module
- Target and spider module
- Sequencer and scanner module
Course 3 – Mapping the application and attack surface
- Spidering
- Mapping application using robots.txt
- Discover hidden contents using dirbuster
- Dirbuster in detail
- Discover hidden directories and files with intruder
- Identify application entry points
- Identify application entry points
- Identify client and server technology
- Identify server technology using banner grabbing (telnet)
- Identify server technology using httprecon
Course 4 – Understanding and exploiting OWASP top 10 vulnerabilities
IBM Free Courses
- Injection
- Broken authentication and session management
- Cross-site scripting
- Insecure direct object reference
- Security misconfiguration
- Sensitive data exposure
- Missing functional level access controls
- Cross-site request forgery
- Using components with known vulnerabilities
- Unvalidated redirects and forwards
F5 CENTRAL Courses
- Injection
- Broken authentication and session management
- Insecure Deserialization
- Sensitive data exposure
- Broken access control
- Insufficient logging and monitoring
- XML external entities
- Using components with known vulnerabilities
- Cross-site scripting
- Security misconfiguration
OWASP Top 10
- Injection explained
- Broken authentication and session management
- Cross-site scripting
- Insecure direct object reference
- Security misconfiguration
- Sensitive data exposure
- Missing functional level access control
- Cross-site request forgery
- Components with known vulnerabilities
- Unvalidated redirects and forwards
Course 5 – Bypassing client-side controls
- What is hidden forms in HTML
- Bypassing hidden form fields using tamper data
- Bypassing hidden form fields using Burp Suite (Purchase application)
- Changing price on eCommerce website using parameter tampering
- Understanding cookie in detail
- Cookie tampering with tamper data
- Cookie tamper part 2
- Understanding referer header in depth using Cisco product
- Introduction to ASP.NET viewstate
- ASP.NET viewstate in depth
- Analyse sensitive data in ASP.NET viewstate
Course 6 – Attacking authentication/login
- Attacking login panel with bad password – Guess username password for the website and try different combinations
- Brute-force login panel
- Username enumeration
- Username enumeration with bruteforce password attack
- Authentication over insecure HTTP protocol
- Authentication over insecure HTTP protocol
- Forgot password vulnerability – case 1
- Forgot password vulnerability – case 2
- Login page autocomplete feature enabled
- Testing for weak password policy
- Insecure distribution of credentials – When you register in any website or you request for a password reset using forgot password feature, if the website sends your username and password over the email in cleartext without sending the password reset link, then it is a vulnerability.
Course 7- Attacking access controls (IDOR, Priv esc, hidden files and directories)
Completely unprotected functionalities
- Finding admin panel
- Finding admin panel and hidden files and directories
- Finding hidden webpages with dirbusater
Insecure direct object reference
Privilege escalation
- What is privilege escalation
- Privilege escalation – Hackme bank – case 1
- Privilege escalation – case 2
Course 8 – Attacking data stores (Various types of injection attacks – SQL|My SQL|No SQL|Oracle, etc.)
Bypassing login panel
SQL injection
- Part 1 – Install SQLi lab
- Part 2 – SQL lab series
- Part 3 – SQL lab series
- Part 4 – SQL lab series
- Part 5 – SQL lab series
- Part 6 – Double query injection
- Part 7 – Double query injection cont..
- Part 8 – Blind injection boolean based
- Part 9 – Blind injection time based
- Part 10 – Dumping DB using outfile
- Part 11 – Post parameter injection error based
- Part 12 – POST parameter injection double query based
- Part 13 – POST parameter injection blind boolean and time based
- Part 14 – Post parameter injection in UPDATE query
- Part 15 – Injection in insert query
- Part 16 – Cookie based injection
- Part 17 – Second order injection
- Part 18 – Bypassing blacklist filters – 1
- Part 19 – Bypassing blacklist filters – 2
- Part 20 – Bypassing blacklist filters – 3
- Part 21 – Bypassing WAF
- Part 22 – Bypassing WAF – Impedance mismatch
- Part 23 – Bypassing addslashes – charset mismatch
NoSQL injection
Xpath injection
LDAP injection
Course 9 – Attacking back-end components (OS command injection, XMl interpreters, mail services, etc.)
OS command injection
This article advised me a lot
Thank you
Welcome Bro <3
Thanks for sharing this!
thank you very much