Sale!

Web Application Penetration Testing

 25,000.00  22,000.00

Duration 40 hours – 2 classes per week
Online Live traning
1. LIVE practical classes conducted by industry professionals from all over World.
2. Classes will be recorded every day and will be available in our cloud drive where you can access it life long through your registered gmail account
3. Certificate from “National institute of Cyber Security ” recognized by all organizations including government
4. Life time access to “HACKERS LAB” online portal containing Video Tutorials, Assignments, Case Studies

Category:

Description

Module 1: Encoding and Filtering

Module 2: Evasion Basic

Module 3: Cross-Site Scripting

Module 4: XSS Filter Evasion and WAF Bypassing

Module 5: Cross-Site Request Forgery

Module 6: SQL Injections

Module 7: SQLi Filter Evasion and WAF Bypassing

Module 8: XML Attacks

  1. Introduction

1.1. Data encoding basics

1.1.1. Dissecting encoding types

1.1.1.1. URL Encoding

1.1.1.2. HTML Encoding

Document character encoding

Character references

1.1.1.3. Base (36|64) encoding

Base 36

Base 64

1.1.1.4. Unicode encoding

1.1.2. Multiple (De|En)codings

1.2. Filtering basics

1.2.1. Regular Expressions

1.2.1.1. Metacharacters

1.2.1.2. Shorthand character classes

1.2.1.3. Non-printing characters

1.2.1.4. Unicode

1.2.2. Web Application Firewall

1.2.2.1. WAF Detection and Fingerprinting

1.2.3. Client-side Filters

  1. Introduction 2.1. Base64 Encoding evasion 2.2. URI Obfuscation techniques 2.2.1. URL shortening 2.2.2. URL Hostname obfuscation 2.3. JavaScript Obfuscation Techniques 2.3.1. JavaScript Encoding 2.3.1.1. Non-alphanumeric 2.3.2. JavaScript Compressing 2.3.2.1. Minifying 2.3.2.2. Packing 2.4. PHP Obfuscation Techniques 2.4.1. Basic Language Reference 2.4.1.1. Type Juggling 2.4.1.2. Numerical Data types 2.4.1.3. String Data types 2.4.1.4. Array Data types 2.4.1.5. Variable Variables 2.4.2. Non-alphanumeric Code 2.4.2.1. String generation
  2. Introduction

3.1. Cross-Site Scripting

3.1.1. Reflected XSS

3.1.2. Persistent XSS

3.1.3. DOM XSS

3.1.4. Universal XSS

3.2. XSS Attacks

3.2.1. Cookie Grabbing

3.2.1.1. Script Injection

3.2.1.2. Cookie Recording & Logging

3.2.1.3. Bypassing HTTPOnly flag

3.2.2. Defacements

3.2.2.1. Virtual Defacement

3.2.2.2. Persistent Defacement

3.2.3. Phishing

3.2.4. Keylogging

3.2.4.1. Keylogging with Metasploit

3.2.4.2. Keylogging with BeEF

3.2.5. Network Attacks

3.2.5.1. IP detection

3.2.5.2. Subnet detection

3.2.5.3. Ping Sweeping

3.2.5.4. Port Scanning

3.2.6.1. Browsers’ security measures

Chromium-based browser

Mozilla Firefox-based browser

Internet Explorer

Safari

3.2.6.2. JavaScript console limitations

  1. Introduction

4.1. Bypassing Blacklisting Filters

4.1.1. Injecting Script Code

4.1.1.1. Bypassing weak <script> tag banning

4.1.1.2. ModSecurity > Script tag based XSS

4.1.1.3. Beyond <script> tag…Using HTML attributes

4.1.2. Keyword based filter

4.1.2.1. Character escaping

Unicode

Decimal, Octal, Hexadecimal

4.2. Bypassing Sanitization

4.2.1. String Manipulations

4.2.1.1. Removing HTML Tags

4.2.1.2. Escaping Quotes

4.2.1.3. Escape Parenthesis

4.3. Bypassing Browser Filters

4.3.1. (Un)Filtered Scenarios

4.3.1.1. Injecting inside HTML attributes

4.3.1.2. Injecting inside SCRIPT tag

4.3.1.3. Injecting inside event attributes

4.3.1.4. DOM Based

4.3.1.5. Other scenarios

  1. Introduction

5.1. XSRF: Recap & More

5.1.1. Vulnerable scenario

5.2. Attack Vectors

5.2.1. Force Browsing with GET

5.2.1.1. Example: Change email address

5.2.2. Post Requests

5.2.2.1. Auto-submitting from > v1

5.2.2.2. Auto-submitting form > v2

5.3. Exploiting Weak Anti-CSRF Measures

5.3.1. Using Post-only requests

5.3.2. Multi-Step Transactions

5.3.3. Checking Referer Header

5.3.4. Predictable Anti-CSRF token

5.3.5. Unverified Anti-CSRF token

5.3.6. Secret Cookies

5.4. Advanced CSRF Exploitation

5.4.1. Bypassing CSRF defenses with XSS

5.4.1.1. Bypassing Anti-CSRF Token Request a valid form with a valid token Extract the valid token from the source code Forge the form with the stolen token

5.4.2. Bypassing Anti-CSRF Token Brute

  1. Introduction

6.1. SQL Injection: Recap & More

6.2. Exploiting SQLi

6.2.1. Techniques Classification

6.2.2. Gathering Information from the Environment

6.2.2.1. Identify the DBMS

Error Codes Analysis > MySQL

Error Codes Analysis > MSSQL

Error Codes Analysis > Oracle

Banner Grabbing

Educated Guessing

String Concatenation

Numeric Functions

SQL Dialect

6.2.2.2. Enumerating the DBMS Content

MySQL

MSSQL

Oracle

Tables & Columns

Users and Privileges 6.3. Advanced SQLi Exploitation

6.3.1. Out-of-Band Exploitation

6.3.1.1. Alternative OOB Channels

6.3.1.2. OOB vi HTTP

Oracle URL_HTTP Package

Oracle HTTPURITYPE Package

6.3.1.3. OOB via DNS

DNS Exfiltration Flow

Provoking DNS requests

MySQL

MSSQL

Oracle

6.3.2. Exploiting Second-Order SQL Injection

6.3.2.1. First-order example

6.3.2.2. Security Considerations

6.3.2.3. Automation Considerations

  1. Introduction

7.1. DBMS gadgets

7.1.1. Functions

7.1.2. Constants and variables

7.1.3. System variables

7.1.4. Typecasting

7.2. Bypassing Keywords filters

7.2.1. Using comments

7.2.2. Case changing

7.2.3. Replaced keywords

7.2.4. Circumventing by Encoding

7.2.5. URL encode

7.2.6. Double URL encode

7.2.7. Characters encoding

7.2.8. Inline comments

7.2.9. Allowed Whitespaces

7.3. Bypassing Functions filters

7.4. Bypassing Regular Expression filters

  1. Introduction

8.1. XML Attacks: Recap & More

8.1.1. Entities block

8.1.1.1. XML Document with External DTD + Entities

8.2. XML Tag Injection

8.2.1. Testing XML Injection

8.2.1.1. Single/Double Quotes

8.2.1.2. Ampersand

8.2.1.3. Angular parentheses

8.2.1.4. XSS with CDATA

8.3. XML eXternal Entity

8.3.1. Taxonomy

8.3.1.1. External Entities: Private vs. Public

8.3.2. Resource Inclusion

8.3.3. Resource Inclusion – Improved

8.3.3.1. Invalid resource to extract

8.3.3.2. CDATA Escape using Parameter Entities

8.3.3.3. php://I/O Stream

8.3.4. Bypassing Access Control

8.3.5. Out-Of-Band Data Retrieval

8.3.5.1. OOB via HTTP

8.3.5.2. OOB via HTTP using XXEServe

8.4. XML Entity Expansion

8.4.1. Recursive Entity Expansion

8.4.1.1. Billion Laugh Attack

8.4.2. Generic Entity Expansion

8.4.2.1. Quadratic Blowup Attack

8.4.3. Remote Entity Expansion

8.5. XPath Injection

8.5.1. XPath 1.0 vs 2.0

8.5.1.1. New Operations and Expressions on Sequences Function on Strings

Function accessors

FOR Operator

Conditional Expression

Regular Expression

Assemble/Disassemble String

8.5.1.2. Data Types

8.5.2. Advanced XPath Exploitation

 

Why Choose National institute of Cyber Security ?

Certified ethical hacking professional course is the most popular cyber security and ethical hacking training in India. The ethicalhacking course goes in depth into the techniques used by Black Hat hackers and demonstrates it live in a lab based 100% practical oriented class. As these hacking skills can be used in a bad way, our ethical hacking course will teach you how you can use the same skills to protect the intellectual property of organizations and individuals and become a white hat hacker. During the course of ethical hacking you will develop the ability to measure and mitigate threats and find out where your organization is more vulnerable to be hacked.
The prime objective of this course is to make you ready for the industry where you can use your skills to protect the organization. After completion of this course you will be able to successfully document Vulnerability Assessment report for the organization

Our Credentials:

Reported Critical Vulnerabilities in

1. Liferay Portal India Website
2. Oxford University Website
3. Hotstar
4. Harvard University
5. Ucall
6. Flock messenger
7. Avalara information security
8. Peter Luk

Closely associated with government agencies and state police for assisting them in cyber crime cases.

Advantages of our course: (online )

1. LIVE practical classes conducted by industry professionals from all over World.

2. Classes will be recorded every day and will be available in our cloud drive where you can access it life long through your registered gmail account

3. Certificate from “National institute of Cyber Security ” recognized by all organizations including government

4. Life time access to “HACKERS LAB” online portal containing Video Tutorials, Assignments, Case Studies

5. If you score more than A+ in you certificate you will be offered a gold membership card of our Research&Devlopment Team

6. 100% Money refund if you are not satisfied within 5 classes.

Company Name: National institute of Cyber Security

You can go for the online classes.

If you are interested please let us know. We will send you the invoice where you can transfer the amount and we can start the classes

Please feel free to contact for any further Clarifications.

National institute of Cyber Security
www.nic-security.com

Fb: www.facebook.com/nicsec.official

Contact : 91- 9780030498 / 6297730297
E-Mail: [email protected]

If you Want to E.M.I payment Method .. 

then contact us to make sure your training…

our mail is [email protected] or [email protected]

Reviews

There are no reviews yet.

Be the first to review “Web Application Penetration Testing”

Your email address will not be published. Required fields are marked *