< NULLCON 2025 - GOA />

About The Training

GO BACK

< Training Title />

HackTheWeb: Pentesting Beyond Basics

< Training Schedule />

Start Date: Mar 03, 2025

End Date: Mar 05, 2025

< Training Venue />

Venue: TBA

< Training Objectives />

Take your web application pen-testing skills to the next level with this intermediate-level training course tailored for professional pen testers, bug hunters, and security enthusiasts. Rooted in the principles of the Open Web Application Security Project (OWASP) Testing Guide, this comprehensive course equips you with a structured and practical approach to uncovering vulnerabilities. By mapping workflows, understanding the intricate components of web applications, and utilizing open-source tools, you'll sharpen your ability to identify critical bugs with precision and efficiency. Designed for those actively engaged in pentest projects, this training is your key to becoming a more proficient and impactful web application pentester.

< Training Level />

Intermediate

< Training Outlines />

Syllabus

Basics

  • Revision of how web technologies work
  • Common terminology
  • Interception Proxy
  • Reverse Shell
  • HTTP Methods etc

Introduction to Web app testing

  • OWASP Top 10 Vulnerabilities
  • OWASP Web App Testing Guide
  • Introduction to Proxies
  • Reporting as you go

Information Gathering

  • Search Engine discovery and reconnaissance for information leakage
  • Fingerprinting the web server
  • Enumerating applications on the web server
  • Fingerprinting Application and Application Framework

Configuration and Deployment Management Testing

  • Application Platform Configuration
  • Subdomain Takeover
  • Cloud Storage

Identity Management Testing

  • Account Provisioning
  • Testing for Roles and Privileges
  • Account Enumeration
  • Weak Username Policy

Authentication Testing

  • Testing Lockout Mechanisms
  • Bypassing Authentication Schema / Attacking JWT implementations
  • Testing for Password Reset Functionalities
  • Testing for Authentication in Alternative Channels / Bypassing 2FA

Authorization Testing

  • Directory Traversal and File Include vulnerabilities
  • Bypassing Authorization Schema
  • Testing for Privilege Escalation
  • Insecure Direct Object References (IDOR)

Session Management Testing

  • Testing Logout Functionality
  • Testing for Session Hijacking
  • Testing for Misconfigured Cookie Attributes

Input Validation/Injection Testing

  • SQL Injection vulnerabilities
  • Time-Based SQL Injection
  • Data Exfiltration via Blind OOB SQL Injection
  • XML Injection vulnerabilities
  • Vanilla XXE attack
  • Data Exfiltration via Blind XXE attacks
  • Modern XSS Attacks
  • LFI / RFI Vulnerabilities
  • Host Header Injection
  • SSRF Attacks
  • SSRF on Traditional Web Apps
  • SSRF over Cloud
  • Template Injection Attacks
  • Exploiting File Upload functionalities
  • Deserialization Attacks

Testing for Weak Cryptography

  • Padding Oracle Attacks
  • Exploiting Weak Encryptions

Testing for Components with Known Vulnerabilities

  • ImageMagic Attacks
  • CMS Attacks
  • Attacking PHP Symphony
  • Attacking vulnerable third-party libraries

Business Logic Testing

  • Building models for Business logic Flows
  • Attacking Coupon Functionality / Process Timing Attacks
  • Attacking Payment Gateways
  • Polluting Application Logs
  • Circumventing Workflows

Reporting

< WHAT TO BRING? />

  • A Laptop with Admin rights, 16+ GB RAM, and Internet access.

< Training PREREQUISITE />

Laptop with

  • Admin Privileges
  • minimum 16 GB ram
  • 100 GB Disk space for Ova
  • Internet Access
  • Ability to install Virtual Box

< WHO SHOULD ATTEND? />

  • Senior Web Application Pentesters
  • Junior Web Application Pentesters
  • Security Engineers
  • Bug Bounty Hunters
  • DVA

< WHAT TO EXPECT? />

  • The course is 30% theory and 70% Hands-on
  • This course focuses on the EB application Pentesting in modern days.
  • The course is focused on a proper grey box pentest, keeping in mind helping bug bounty hunters understand application workflows to find improved Business logic flaws. 

< WHAT ATTENDEES WILL GET? />

Attendees will get the following:

  • ova file containing the tools required for the lab
  • Access to State of the Art Hacking Lab
  • Slide deck
  • Answer Sheets
  • Cheat Sheets
  • Tips and Tricks document for various attacks 

< WHAT NOT TO EXPECT? />

This is not beginner training, Prior knowledge of Web App Pentest is required. We will be building upon the existing knowledge to improve the understanding of the vulnerabilities and learn how to exploit them.

This is 30% theory and 70% hands-on training. There will be lots of exercises. An additional 5 days of lab time will be given to play with the lab environment.

< About the Trainer />

Dhruv Shah is an information security professional with over 13+ years of expertise in application, mobile, network, and cloud security. He has co-authored the books “Kali Linux Intrusion and Exploitation” and “Hands-on Pentesting with BurpSuite” by Packtpub. Dhruv has delivered advanced web hacking and Hacking and securing cloud Infrastructure classes and trained at major cybersecurity conferences such as Black Hat USA, Europe, and Asia, as well as other notable events like Hack in Paris, BSides Lisbon, Texas Cyber Summit, etc. He has provided security training to clients across the UK, EU, and USA. He is a core member of Recon Village at Defcon. His online presence is under the handle @snypter.