Web applications are the source of many security vulnerabilities. Because of this, many web developers try to lock down the security of their web applications. However, not all of them do it correctly or completely, leaving certain avenues of attack still open. The Advanced Web Exploitation course explores how to search for, find, and exploit these hard to find vulnerabilities.
Each module will have video lecture content, explaining how to evade common incomplete mitigation strategies and how to find and exploit difficult vulnerabilities. Each module will also have a hands-on lab component, in which the students will have the chance to experiment with advanced techniques, seeing why they work and how they can be modified in whatever unique situation is encountered. Students will then complete a capstone lab that will allow the student to explore a novel web application and perform a multistep attack to exploit it completely.
At the end of this course, students will understand the shortcomings of incomplete fixes to these vulnerabilities. They will also understand how these vulnerabilities might manifest themselves and how to modify their attack strategy to compensate.
Evade common incomplete filters to achieve the basic attacks. String multiple attacks together to achieve a more difficult objective.
Lab 1: Recon Tools
Lab 2.1: Detecting and Exploiting Hard to Find SQL Injection Vulnerabilities
Lab 2.2: Advanced SQLmap
Lab 2.3: Manual Blind SQL Injection
Lab 2.4: NOSQL Injection
Lab 3.1: XSS Filter Evasion
Lab 3.2: Exploiting Misconfigured CORS
Lab 4: OS Command Injection Filter Evasion
Lab 5: Advanced Local File Inclusion
Lab 6: Advanced Cross Site Request Forgery
Lab 7.1: XXE to Obtain Arbitrary Files
Lab 7.2: Out Of Band XXE
Lab 8: SSRF for Internal Port Scanning and File Disclosure
Lab 9: Exploiting Insecure Deserialization in Java and Python
Lab 10: Capstone: Multistage Attack on a Partially Hardened Web Application