About The Training
Goa 2025 | Trainings
- AI Security: Terminating The Terminator
- Advanced Infrastructure Security Assessment
- Attack and Defend Software Supply Chains
- Azure Cloud Attacks for Red and Blue Teams
- Blocking the Storm: A Hands-On Guide to Hardening and Securing Kubernetes Clusters
- DevSecOps - A Hands-on Experience
- Efficient Malware Analysis: Comprehensive Approach
- HackTheWeb: Pentesting Beyond Basics
- Hacking Android Applications
- IoT Security Bootcamp GOA Edition
- Rapid Threat Model Prototyping (RTMP) - Agile Threat Modeling Mastery including Cloud and AI
- Slaying the RE Dragon: Mastering Reverse Engineering
- The Application Security Tool Stack - How to Discover Vulnerabilities in Software
HackTheWeb: Pentesting Beyond Basics
Start Date: Mar 03, 2025
End Date: Mar 05, 2025
Venue: TBA
Take your web application pen-testing skills to the next level with this intermediate-level training course tailored for professional pen testers, bug hunters, and security enthusiasts. Rooted in the principles of the Open Web Application Security Project (OWASP) Testing Guide, this comprehensive course equips you with a structured and practical approach to uncovering vulnerabilities. By mapping workflows, understanding the intricate components of web applications, and utilizing open-source tools, you'll sharpen your ability to identify critical bugs with precision and efficiency. Designed for those actively engaged in pentest projects, this training is your key to becoming a more proficient and impactful web application pentester.
Intermediate
Syllabus
Basics
- Revision of how web technologies work
- Common terminology
- Interception Proxy
- Reverse Shell
- HTTP Methods etc
Introduction to Web app testing
- OWASP Top 10 Vulnerabilities
- OWASP Web App Testing Guide
- Introduction to Proxies
- Reporting as you go
Information Gathering
- Search Engine discovery and reconnaissance for information leakage
- Fingerprinting the web server
- Enumerating applications on the web server
- Fingerprinting Application and Application Framework
Configuration and Deployment Management Testing
- Application Platform Configuration
- Subdomain Takeover
- Cloud Storage
Identity Management Testing
- Account Provisioning
- Testing for Roles and Privileges
- Account Enumeration
- Weak Username Policy
Authentication Testing
- Testing Lockout Mechanisms
- Bypassing Authentication Schema / Attacking JWT implementations
- Testing for Password Reset Functionalities
- Testing for Authentication in Alternative Channels / Bypassing 2FA
Authorization Testing
- Directory Traversal and File Include vulnerabilities
- Bypassing Authorization Schema
- Testing for Privilege Escalation
- Insecure Direct Object References (IDOR)
Session Management Testing
- Testing Logout Functionality
- Testing for Session Hijacking
- Testing for Misconfigured Cookie Attributes
Input Validation/Injection Testing
- SQL Injection vulnerabilities
- Time-Based SQL Injection
- Data Exfiltration via Blind OOB SQL Injection
- XML Injection vulnerabilities
- Vanilla XXE attack
- Data Exfiltration via Blind XXE attacks
- Modern XSS Attacks
- LFI / RFI Vulnerabilities
- Host Header Injection
- SSRF Attacks
- SSRF on Traditional Web Apps
- SSRF over Cloud
- Template Injection Attacks
- Exploiting File Upload functionalities
- Deserialization Attacks
Testing for Weak Cryptography
- Padding Oracle Attacks
- Exploiting Weak Encryptions
Testing for Components with Known Vulnerabilities
- ImageMagic Attacks
- CMS Attacks
- Attacking PHP Symphony
- Attacking vulnerable third-party libraries
Business Logic Testing
- Building models for Business logic Flows
- Attacking Coupon Functionality / Process Timing Attacks
- Attacking Payment Gateways
- Polluting Application Logs
- Circumventing Workflows
Reporting
- A Laptop with Admin rights, 16+ GB RAM, and Internet access.
Laptop with
- Admin Privileges
- minimum 16 GB ram
- 100 GB Disk space for Ova
- Internet Access
- Ability to install Virtual Box
- Senior Web Application Pentesters
- Junior Web Application Pentesters
- Security Engineers
- Bug Bounty Hunters
- DVA
- The course is 30% theory and 70% Hands-on
- This course focuses on the EB application Pentesting in modern days.
- The course is focused on a proper grey box pentest, keeping in mind helping bug bounty hunters understand application workflows to find improved Business logic flaws.
Attendees will get the following:
- ova file containing the tools required for the lab
- Access to State of the Art Hacking Lab
- Slide deck
- Answer Sheets
- Cheat Sheets
- Tips and Tricks document for various attacks
This is not beginner training, Prior knowledge of Web App Pentest is required. We will be building upon the existing knowledge to improve the understanding of the vulnerabilities and learn how to exploit them.
This is 30% theory and 70% hands-on training. There will be lots of exercises. An additional 5 days of lab time will be given to play with the lab environment.
Dhruv Shah is an information security professional with over 13+ years of expertise in application, mobile, network, and cloud security. He has co-authored the books “Kali Linux Intrusion and Exploitation” and “Hands-on Pentesting with BurpSuite” by Packtpub. Dhruv has delivered advanced web hacking and Hacking and securing cloud Infrastructure classes and trained at major cybersecurity conferences such as Black Hat USA, Europe, and Asia, as well as other notable events like Hack in Paris, BSides Lisbon, Texas Cyber Summit, etc. He has provided security training to clients across the UK, EU, and USA. He is a core member of Recon Village at Defcon. His online presence is under the handle @snypter.