Hack YourSelf First Training Course / Web application Security testing
“How can I test my applications for security so that security bugs can be fixed?”
Target Audience
Developers, Programmers, Quality Analysts, Testers, Architects with
- Understanding of what is HTML, CSS, JavaScript
- Ability to understand int result = 0; result = sum (2 + 3);
Topics
- The Forrest Rabbit Analogy
- Disclaimer and Responsible activities
- Defining a Risk
- The HTTP Protocol
- Cookies
- The OWASP foundation and projects
- The Penetration Testing Methodology
- Learning to Install the tools of the trade
- Introducing our vulnerable applications of the day
- Learning to Identifyo Injection flaws- Sql Injection- Operating System Command Injections- Exploitationo Cross Site Scripting Flaws– Reflected– Stored– Exploitationo Real world case studies
- How to – Session Hijacking and Privilege Escalations
- A look at Transport Layer securityo The CIAo The Certificates and the Authoritieso Audit process
- Summing the Information Disclosure Flaws
- Learning to Identifyo Cross Site Request Forgeryo Malicious File uploadso File Inclusionso Authorization Flawso Unvalidated Redirects
- Reporting Guidelines
- Risk Classification Guidelines
Outcome
- Intermediate level of knowledge to identify potential application security flaws
- The many number of tools and secrets used by Ethical hackers world wide
- Brief overview of security controls techniques
- Being able to ethically hack web application right after stepping out of the class
- Practical, hands on, and real world workshop enables learning by actually hacking
- Being able to recognize patters and common vulnerabilities
- Being able to classify risks and report them responsibly