Why Web Security?
  • Introduction
  • Core Problems - Why Web Security
  • Web Technologies
  • Preparing the Lab Environment
  • Information Gathering using Search Engines and Social Networks - part 1
  • Information Gathering using Search Engines and Social Networks - part 2
  • Join Our Online Classroom!
Mapping the Web Application. User and Password Brute-Forcing
  • What Web Application Mapping Means
  • Usernames and Passwords Brute-Forcing using Burp
  • Spider and Analyze a Website using Burp
  • Brute-frocing Web Resources using Dirb and Dirbuster
Attacking Authentication and Session Management - Session Hijacking
  • Theoretical Overview of Attacking Authentication and Session Management
  • Session Hijacking trough Man In The Middle Attack
  • Intercept and access traffic over HTTPS. Get Facebook or Gmail Passwords
Access controls. Data stores and Client-side Controls
  • Theoretical Approach of Attacking Access Controls
  • SQL injection
  • Exploiting SQLi using Sqlmap and Getting Remote Shell
  • Upload and Remote File Execution
Attacking the Server and Application Logic
  • Attacking the server: OS Command injection, Path Traversal and Mail Injection
  • Attacking Application Logic
(XSS) Cross Site Scripting. Attacking the Users
  • Cross Site Scripting Theory. Attacking Users
  • Reflected XSS – Session Hijacking using Cross Site Scripting
  • Stored or Persistent Cross Site Scripting
  • Beef-XSS Demo
  • Cross-site Request Forgery (CSRF)
Guideline for Discovering and Improving Application Security
  • Bonus - OWASP Top 10 Vulnerabilities
  • Guideline for Discovering and Improving Application Security
(Bonus) Burp Tool for Advanced Web Penetration Testing
  • Alternative setup - Download Burp. Free vs Paid
  • Environment Setup. Import Burp Certificate
  • Proxy - General Concept
  • Target Module
  • Proxy Module - part 1
  • Proxy Module - part 2
  • Further information
(Bonus) Network Attacks
  • Demo - Use Nessus to Discover Vulnerabilities
  • Demo - Using Paros for Vulnerability Discovery
  • Metasploit
  • Demo - Exploiting FTP Server Vulnerability using Metasploit
  • Hacking Wireless Networks
(Bonus) Android reverse Engineering
  • APK file Structure. AndroidManifest XML file
  • Reversing to get Source code of the Application - decompiling with dex2jar
  • Reversing and Re-compiling With APKTool
  • Static Analysis of Android Application using QARK
  • Owasp Top 10 Mobile
(Bonus) Social Engineering Basics
  • Introduction to Maltego
  • Maltego - demo