Option to extend hacking lab access for 30 days after the class
Real world challenges from Authentication issues to RCE, SSRF, XXE and more
The labs are continuosly developed to include latest exploits and tools.
This class teaches audience a wealth of hacking techniques to compromise modern day web applications, APIs and associated end-points. This class focus on specific areas of appsec and on advanced vulnerability identification and exploitation techniques. The class allows attendees to learn and practice some neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs. The vulnerabilities selected for the class either typically go undetected by modern scanners or the exploitation techniques are not so well known. Attendees can also benefit from a state-of-art Hacklab and we can provide 30 days lab access after the class to allow attendees more practice time.
This fast-paced class, gives attendees an insight into Advanced Web Hacking, the team has built a state of the art hacklab and recreated security vulnerabilities based on real life Pen Tests and real bug bounties seen in the wild.
Token Hijacking attacks
Logical Bypass / Boundary Conditions
Bypassing 2 Factor Authentication
Authentication Bypass using Subdomain Takeover
JWT Token Brute-Force attacks
SAML Authorization Bypass
Host Header Validation Bypass
Case study of popular password reset fails.
Invite/Promo Code Bypass
API Authorisation Bypass
HTTP Parameter Pollution (HPP)
Advanced XXE Exploitation over OOB channels
XXE through SAML
XXE in File Parsing
Known Plaintext Attack (Faulty Password Reset)
Padding Oracle Attack
Hash length extension attacks
Auth bypass using .NET Machine Key
Java Serialisation Attack
.Net Serialisation Attack
Node.js Serialization Attack
PHP Serialization Attack
JSON Serialization Attack
Server Side Template Injection
2nd order injection
SQLi through crypto
OS code exec via powershell
Advanced topics in SQli
Advanced SQLMap Usage and WAF bypass
Exploiting code injection over OOB channel
Malicious File Extensions
Circumventing File validation checks
Exploiting hardened web servers
SSRF to query internal network
SSRF to call internal files
Various Case studies
Google Dorking in the Cloud Era
Post Exploitation techniques on Cloud hosted applications
Various Case Studies
Identifying and attacking various CMS
Attacking Hardened WordPress, Joomla and Sharepoint
Identifying Blind XSS via OOB channel
Exploiting Self XSS
Various Case Studies on weird and wonderful XSS and CSRF attacks
Web Caching Attacks
Attack Chaining N tier vulnerability Chaining leading to RCE
Web developers, SOC analysts, intermediate level penetration testers, DevOps engineers, network engineers, security architects, security enthusiasts and anyone who wants to take their skills to next level.
Students must bring their own laptop and have admin/root access on it. The laptop must have a virtualization software (virtualbox / VMWare) pre installed. A customized version of Kali Linux (ova format) containing custom tools, scripts and VPN scripts for the class will be provided to the students. The laptop should have at least 4 GB RAM and 20 GB of free disk space dedicatedly for the VM.
Lab-Based Training - Written by BlackHat Trainers - Available Globally
NotSoSecure classes are ideal for those preparing for CREST CCT (ICE), CREST CCT (ACE), CHECK (CTL), TIGER SST and other similar industry certifications, as well as those who perform Penetration Testing on infrastructure / web applications as a day job & wish to add to their existing skill set.
Working exclusively with 3 training delivery partners, NotSoSecure Hacking Training is available around the world.