Finding, fixing, and exploiting web application vulnerabilities. We investigate the entire OWASP Top 10, with hands-on labs covering:
Leveraging SQL Injection and Command Injection vulnerabilities – to extract confidential data, compromise database, and compromise web servers directly.
The hands-on lab covers using dynamic analysis to find injection vulnerabilities as well as manual exploitation techniques – including using blind exploitation to prove and exploit difficult vulnerabilities.
Leveraging Cross-site Scripting (XSS) attacker to perform virtual defacement, extract confidential information, and perform privilege escalation attacks.
The hands-on lab covers using cross-site scripting to extract confidential data, with examples taken from real-world attacks impacting major organisations – plus a few defacements just for fun.
Abusing File Upload
Uploading malicious files to gain command execution on vulnerable web servers, allowing for confidential data theft as well pivoting into DMZ and internal corporate networks.
The lab includes gaining command execution as well as steps to perform privilege escalation.
Broken Authentication and Access Control
We cover a range of authentication and access control vulnerabilities; including brute-forcing web application, insecure direct object reference, and missing functional level access control.
We explore how to test for authentication and access control issues, as well as how to determine the real-world risk of these issues.