Shaping the future of IT skills

Maximising IT performance through learning

NotSoSecure Advanced Web Hacking - AWH




Show Tabs

Much like our popular Advanced Infrastructure Hacking class, this class talks about a wealth of hacking techniques to compromise web applications, APIs, cloud components and other associated end-points. This class focuses on specific areas of appsec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). The class allows attendees to practice some neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs. The vulnerabilities selected for the class either typically go undetected by modern scanners or the exploitation techniques are not so well known.

Note: Attendees will also benefit from a state-of-art Hacklab and we will be providing free 30 days lab access after the class to allow attendees more practice time.

Prerequisites & Audience

Students must use their own laptop and have admin/root access on it. The laptop must have a virtualization software (virtualbox / VMWare) pre installed. A customized version of Kali Linux (ova format) containing custom tools, scripts and VPN scripts for the class will be provided to the students. The laptop should have at least 4 GB RAM and 20 GB of free disk space dedicatedly for the VM.

Users are also encouraged to familiarize themselves with Burp Suite to gain maximum out of the class.

Course Benefits

The latest hacks in the world of web hacking. The class content has been carefully handpicked to focus on some neat, new and ridiculous attacks.

•   We provide a custom kali image for this class. The custom kali image has been loaded with a number of plugins and tools (some public and some NotSoPublic) and these aid in quickly identifying and exploiting vulnerabilities discussed during the class.

•   The class is taught by a real Pen Tester and the real-world stories shared during the class help attendees in putting things into perspective.

Delegates Receive

Access to a hacking lab not just during the course but for 30 days after the class too. This gives them plenty of time to practice the concepts taught in the class. Numerous scripts and tools will also be provided during the training, along with student handouts.

Our courses also come with detailed answer sheets. That is a step by step walkthrough of how every exercise within the class needs to be solved. These answer sheets are also provided to students at the end of the class.

Course Topics

Lab Setup and architecture overview

Introduction to Burp Features

Attacking Authentication and SSO

•   Token Hijacking attacks

•   Logical Bypass / Boundary Conditions

•   Bypassing 2 Factor Authentication

•   Authentication Bypass using Subdomain Takeover

•   JWT/JWS Token attacks

•   SAML Authorization Bypass

•   OAuth Issues

Password Reset Attacks

•   Session Poisoning

•   Host Header Validation Bypass

•   Case study of popular password reset fails

Business Logic Flaws / Authorization flaws

•   Mass Assignment

•   Invite/Promo Code Bypass

•   Replay Attack

•   API Authorisation Bypass

•   HTTP Parameter Pollution (HPP)

XML External Entity (XXE) Attack

•   XXE Basics

•   Advanced XXE Exploitation over OOB channels

•   XXE through SAML

•   XXE in File Parsing

Breaking Crypto

•   Known Plaintext Attack (Faulty Password Reset)

•   Padding Oracle Attack

•   Hash length extension attacks

•   Auth bypass using .NET Machine Key

•   Exploiting padding oracles with fixed IVs

Remote Code Execution (RCE)

•   Java Serialization Attack

•   .Net Serialization Attack

•   PHP Serialization Attack

•   Python serialization attack

•   Server Side Template Injection

•   Exploiting code injection over OOB channel

SQL Injection Masterclass

•   2nd order injection

•   Out-of-Band exploitation

•   SQLi through crypto

•   OS code exec via PowerShell

•   Advanced topics in SQli

•   Advanced SQLMap Usage and WAF bypass

•   Pentesting GraphQL

Tricky File Upload

•   Malicious File Extensions

•   Circumventing File validation checks

•   Exploiting hardened web servers

•   SQL injection via File Metadata

Server-Side Request Forgery (SSRF)

•   SSRF to query internal network

•   SSRF to exploit templates and extensions

•   SSRF filter bypass techniques

•   Various Case studies

Attacking the Cloud

•   SSRF Exploitation

•   Serverless exploitation

•   Google Dorking in the Cloud Era

•   Cognito misconfiguration to data exfiltration

•   Post Exploitation techniques on Cloud-hosted applications

•   Various Case Studies

Attacking Hardened CMS

•   Identifying and attacking various CMS

•   Attacking Hardened Wordpress, Joomla, and Sharepoint

Web Caching Attacks

Miscellaneous Vulnerabilities

•   Unicode Normalization attacks

•   Second order IDOR attack

•   Exploiting misconfigured code control systems

•   HTTP Desync attack

Attack Chaining N tier vulnerability Chaining leading to RCE

Various Case Studies

•   A Collection of weird and wonderful XSS and CSRF attacks

NotSoSecure courses

NotSoSecure Advanced Infrastructure Hacking - AIH
NotSoSecure The Art of Hacking - AoH
NotSoSecure Advanced Web Hacking - AWH
NotSoSecure Hacking and Securing Cloud Infrastructure
NotSoSecure AppSec for Developers - APPSEC
NotSoSecure DevSecOps - DEVSECOPS
NotSoSecure Hacking 101
Webinar Hacking and Securing Cloud Infrastructure : The Anatomy of a Cloud Hack
Webinar Basic Infrastructure Hacking : Through an Attacker's Eyes: Your Infrastructure
Webinar Basic Web Hacking : Through an Attacker's Eyes: Your Web Applications
We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.