COURSE OVERVIEW
The goal of the training is to refresh information about most common web application
vulnerabilities along with the information about the latest attack tactics and techniques.
Examples are based on the recent vulnerability reports submitted on HackerOne and BugCrowd
platforms.
COURSE OUTLINE
I. Broken Access Control
1. Unsecure functionality
2. Parameter-based access controls
3. Insecure direct object reference
4. Referrer / Path based access control
5. Metadata manipulation
6. JWT tampering
7. Path traversal
II. Cryptographic Failures
1. Cipher suites analysis
2. Enforcing encryptions (HSTS)
3. Common cryptographic vulnerabilities
4. Key stores
5. Storing passwords
III. Injection
1. Command injection
2. SQL injection
3. NoSQL injection
4. Server-side template injection
5. GraphQL injection
6. Remote File Inclusion
7. Cross site scripting
8. Reflected XSS
9. Stored XSS
10. DOM XSS
11. Content Security Policy
IV. Security Misconfiguration
1. XML External Entities
2. Debug modes
3. Error handling
4. Missing http headers
5. CORS misconfiguration
V. Vulnerable and Outdated Components
1. Identifying outdated components
VI. Identification and Authentication Failures
1. Forced browsing
2. Brute forcing
3. Password spraying
4. MFA attacks
5. Session attacks
6. OAuth vulnerabilities
VII. Software and Data Integrity Failures
1. Insecure deserialization
VIII. Forgery attacks
1. Server-side request forgery
2. Client-side request forgery
3. File upload vulnerabilities
IX. Desync and poisoining
1. HTTP request smuggling
2. Web cache poisoning