Course Code: wasr
Duration: 7 hours
Prerequisites:



 

Course Outline:

COURSE OVERVIEW

The goal of the training is to refresh information about most common web application
vulnerabilities along with the information about the latest attack tactics and techniques.
Examples are based on the recent vulnerability reports submitted on HackerOne and BugCrowd
platforms.

COURSE OUTLINE

I. Broken Access Control

1. Unsecure functionality
2. Parameter-based access controls
3. Insecure direct object reference
4. Referrer / Path based access control
5. Metadata manipulation
6. JWT tampering
7. Path traversal

II. Cryptographic Failures

1. Cipher suites analysis
2. Enforcing encryptions (HSTS)
3. Common cryptographic vulnerabilities
4. Key stores
5. Storing passwords

III. Injection

1. Command injection
2. SQL injection
3. NoSQL injection
4. Server-side template injection
5. GraphQL injection
6. Remote File Inclusion
7. Cross site scripting
8. Reflected XSS
9. Stored XSS
10. DOM XSS
11. Content Security Policy

IV. Security Misconfiguration

1. XML External Entities
2. Debug modes
3. Error handling

4. Missing http headers
5. CORS misconfiguration

V. Vulnerable and Outdated Components

1. Identifying outdated components

VI. Identification and Authentication Failures

1. Forced browsing
2. Brute forcing
3. Password spraying
4. MFA attacks
5. Session attacks
6. OAuth vulnerabilities

VII. Software and Data Integrity Failures

1. Insecure deserialization

VIII. Forgery attacks

1. Server-side request forgery
2. Client-side request forgery
3. File upload vulnerabilities

IX. Desync and poisoining

1. HTTP request smuggling
2. Web cache poisoning