Loading…
Wednesday, May 15 • 8:30am - 5:00pm
Real World Web Application Hacking [Day 2 of 2]

Sign up or log in to save this to your schedule and see who's attending!

Title: Real World Web Application Hacking

This training lasts: 2 Days

Course Abstract
This training course was custom developed to put you right into the action and simulate real world web attacks.  On day one of the course, you'll be hired to perform a penetration test against a BitCon Exchange.  You'll go through the Hacker Playbook methodology to perform both basic and advanced attacks.  On day two of the course, you'll focus on newer attacks and frameworks.  In recent years, we have seen a number of new languages and frameworks such as NodeJS/Express.  With these new technologies come both old and new vulnerabilities.  You'll be tasked to attack a Node Chat Application and understand why you can't use generic attacks against these new frameworks.
This isn't your average web app course!  We built the labs around what we are seeing as penetration testers and bug bounty hunters.

Course Objectives:
Perform and understand both common and advanced web attacks
Learn how bug bounty hunters perform quick and effective reconnaissance
Manually attack applications with and without the use of tools
Fuzz inputs for potential injection points
Find critical vulnerabilities in applications
Understand vulnerabilities in newer languages/frameworks such as NodeJS and Express
 
Training Syllabus
Day 1  - Primer
Recon/Spidering
Attacking XSS, Polyglots, and Blind XSS
Cross-Site Request Forgery
Integer Underflows
Insecure Direct Object Reference
Local File Inclusions and Server Side Request Forgery
Manual SQL Injections
Remote Code Execute with Images
Day 2  - Advanced Attacks
XML eXternal Entities (XXE) and OOB
DOM XSS
Deserialization Attacks
NoSQL
Template Injection
Node.JS Attacks
Cloud Issues
 
Upon Completion of this training, attendees will know:
How to perform a web application penetration test
How to use proxy tools such as Burp Suite
How to manually identify vulnerabilities
How to become a bug bounty hunter
How to protect your own web applications from attackers
Attendees will be provided with (by trainer):
A signed copy of The Hacker Playbook 3!
Custom Virtual Machines
Lab Material PDF
 
Attendees should bring:
Laptop with administrator access
Laptop with network connectivity and dongles
Laptop capable of running two virtual machines simultaneously using either VMware Workstation or Player or Fusion (for OS X)
Laptop with 30GB of free disk spaces
You must have ability to disable the host firewall (Windows firewall or other third party firewall) and antivirus running on your desktop...
A passion to learn!
Pre-requisites for attendees:
Basic security concepts
Basic GNU/Linux command line
Understanding of how web protocols communicate
 
Trainer biography
Peter Kim has been in the information security industry for the last 15 years and been a penetration tester/red teamer for the last 12 years.  During this time he worked for multiple utility companies, Fortune 1000 entertainment companies, government agencies, and the Federal Reserve.  He gives back to the security community by teaching penetration testing courses at the community college and creating/maintaining one of the largest security communities in the Southern CA area (meetup.com/LETHAL).  He is the best-selling author of three offensive security books, The Hacker Playbook 1, 2& 3.  He has also spoken and trained at multiple security conferences including Toorcon, Derbycon, ISSA, OWASP AppSec, LETHAL, and Baythreat.

Speakers
avatar for Peter Kim

Peter Kim

CEO, Secure Planet
Peter Kim has been in the information security industry for the last 15 years and been a penetration tester/red teamer for the last 12 years.   During this time was a penetration tester/red teamer for multiple utility companies, Fortune 1000 entertainment companies, government agencies... Read More →


Wednesday May 15, 2019 8:30am - 5:00pm
Terrace Lounge

Attendees (15)