Phase 1 – History
Phase 2 – Web and Server Technology
Phase 3 – Setting up the lab with BurpSuite and bWAPP
ÆTHER SECURITY LAB
Phase 4 – Mapping the application and attack surface
Phase 5 – Understanding and exploiting OWASP top 10 vulnerabilities
IBM
F5 CENTRAL
LUKE BRINER
Phase 6 – Session management testing
Phase 7 – Bypassing client-side controls
Phase 8 – Attacking authentication/login
Phase 9 - Attacking access controls (IDOR, Priv esc, hidden files and directories)
Insecure direct object reference
Privilege escalation
Phase 10 – Attacking Input validations (All injections, XSS and mics)
HTTP parameter pollution
XSS - Cross site scripting
SQL injection
NoSQL injection
Xpath and XML injection
LDAP injection
OS command injection
Local file inclusion
Remote file inclusion
HTTP splitting/smuggling
Phase 11 – Generating and testing error codes
Phase 12 – Weak cryptography testing
Phase 13 – Business logic vulnerability
youtube.com
hackerone.com
0 Comments: