Phase 1 – History History of Internet -   https://www.youtube.com/watch?v=9hIQjrMHTv4 Phase 2 – Web and Server Technology 1....

Complete Web Application Penetration Testing bundle!

Phase 1 – History




Phase 2 – Web and Server Technology


1. Basic concepts of web applications, how they work and the HTTP protocol - https://www.youtube.com/watch?v=RsQ1tFLwldY&t=7s
2. HTML basics part 1 - https://www.youtube.com/watch?v=p6fRBGI_BY0
3. HTML basics part 2 - https://www.youtube.com/watch?v=Zs6lzuBVK2w
4. Difference between static and dynamic website - https://www.youtube.com/watch?v=hlg6q6OFoxQ
5. HTTP protocol Understanding - https://www.youtube.com/watch?v=JFZMyhRTVt0
6. Parts of HTTP Request -https://www.youtube.com/watch?v=pHFWGN-upGM
7. Parts of HTTP Response - https://www.youtube.com/watch?v=c9sMNc2PrMU
8. Various HTTP Methods - https://www.youtube.com/watch?v=PO7D20HsFsY
11. HTTP Request & Response Headers - https://www.youtube.com/watch?v=vAuZwirKjWs
15. Authentication with HTTP - https://www.youtube.com/watch?v=GxiFXUFKo1M
16. HTTP basic and digest authentication - https://www.youtube.com/watch?v=GOnhCbDhMzk
17. What is “Server-Side” - https://www.youtube.com/watch?v=JnCLmLO9LhA
18. Server and client side with example - https://www.youtube.com/watch?v=DcBB2Fp8WNI
20. Introduction to UTF-8 and Unicode - https://www.youtube.com/watch?v=sqPTR_v4qFA
24. Hex encoding & ASCII - https://www.youtube.com/watch?v=WW2SaCMnHdU


Phase 3 – Setting up the lab with BurpSuite and bWAPP


MANISH AGRAWAL


ÆTHER SECURITY LAB





Phase 4 – Mapping the application and attack surface


2. Mapping application using robots.txt - https://www.youtube.com/watch?v=akuzgZ75zrk
3. Discover hidden contents using dirbuster - https://www.youtube.com/watch?v=--nu9Jq07gA
5. Discover hidden directories and files with intruder - https://www.youtube.com/watch?v=4Fz9mJeMNkI
6. Directory bruteforcing 1 - https://www.youtube.com/watch?v=ch2onB_LFoI
7. Directory bruteforcing 2 - https://www.youtube.com/watch?v=ASMW_oLbyIg
8. Identify application entry points - https://www.youtube.com/watch?v=IgJWPZ2OKO8&t=34s
10. Identify client and server technology - https://www.youtube.com/watch?v=B8jN_iWjtyM

11. Identify server technology using banner grabbing (telnet) - https://www.youtube.com/watch?v=O67M-U2UOAg
12. Identify server technology using httprecon - https://www.youtube.com/watch?v=xBBHtS-dwsM
13. Pentesting with Google dorks Introduction - https://www.youtube.com/watch?v=NmdrKFwAw9U
15. Use Nmap for fingerprinting web server - https://www.youtube.com/watch?v=VQV-y_-AN80
16. Review webs servers metafiles for information leakage - https://www.youtube.com/watch?v=sds3Zotf_ZY
17. Enumerate applications on web server - https://www.youtube.com/watch?v=lfhvvTLN60E
19. Map execution path through application - https://www.youtube.com/watch?v=0I0NPiyo9UI
Fingerprint web application frameworks - https://www.youtube.com/watch?v=ASzG0kBoE4c



Phase 5 – Understanding and exploiting OWASP top 10 vulnerabilities


1. A closer look at all owasp top 10 vulnerabilities - https://www.youtube.com/watch?v=avFR_Af0KGk

IBM


10. Using components with known vulnerabilities -


F5 CENTRAL




LUKE BRINER





Phase 6 – Session management testing


1. Bypass authentication using cookie manipulation - https://www.youtube.com/watch?v=mEbmturLljU
2. Cookie Security Via httponly and secure Flag - OWASP - https://www.youtube.com/watch?v=3aKA4RkAg78
3. Penetration testing Cookies basic - https://www.youtube.com/watch?v=_P7KN8T1boc
5. Session fixation 2 - https://www.youtube.com/watch?v=0Tu1qxysWOk
6. Session fixation 3 - https://www.youtube.com/watch?v=jxwgpWvRUSo
8. CSRF - Cross site request forgery 1 - https://www.youtube.com/watch?v=m0EHlfTgGUU
9. CSRF - Cross site request forgery 2 - https://www.youtube.com/watch?v=H3iu0_ltcv4
10. CSRF - Cross site request forgery 3 - https://www.youtube.com/watch?v=1NO4I28J-0s
11. CSRF - Cross site request forgery 4 - https://www.youtube.com/watch?v=XdEJEUJ0Fr8
12. CSRF - Cross site request forgery 5 - https://www.youtube.com/watch?v=TwG0Rd0hr18
Admin bypass using session hijacking - https://www.youtube.com/watch?v=1wp1o-1TfAc




Phase 7 – Bypassing client-side controls


1. What is hidden forms in HTML - https://www.youtube.com/watch?v=orUoGsgaYAE
2. Bypassing hidden form fields using tamper data - https://www.youtube.com/watch?v=NXkGX2sPw7I
3. Bypassing hidden form fields using Burp Suite (Purchase application) - https://www.youtube.com/watch?v=xahvJyUFTfM
4. Changing price on eCommerce website using parameter tampering - https://www.youtube.com/watch?v=A-ccNpP06Zg
6. Cookie tampering with tamper data- https://www.youtube.com/watch?v=NgKXm0lBecc
7. Cookie tamper part 2 - https://www.youtube.com/watch?v=dTCt_I2DWgo
8. Understanding referer header in depth using Cisco product - https://www.youtube.com/watch?v=GkQnBa3C7WI&t=35s
9. Introduction to ASP.NET viewstate - https://www.youtube.com/watch?v=L3p6Uw6SSXs
10. ASP.NET viewstate in depth - https://www.youtube.com/watch?v=Fn_08JLsrmY
12. Cross-origin-resource-sharing explanation with example - https://www.youtube.com/watch?v=Ka8vG5miErk



Phase 8 – Attacking authentication/login


1. Attacking login panel with bad password - Guess username password for the website and try different combinations
2. Brute-force login panel - https://www.youtube.com/watch?v=25cazx5D_vw
3. Username enumeration - https://www.youtube.com/watch?v=WCO7LnSlskE
4. Username enumeration with bruteforce password attack - https://www.youtube.com/watch?v=zf3-pYJU1c4
5. Authentication over insecure HTTP protocol - https://www.youtube.com/watch?v=ueSG7TUqoxk
6. Authentication over insecure HTTP protocol - https://www.youtube.com/watch?v=_WQe36pZ3mA
7. Forgot password vulnerability - case 1 - https://www.youtube.com/watch?v=FEUidWWnZwU
8. Forgot password vulnerability - case 2 - https://www.youtube.com/watch?v=j7-8YyYdWL4
9. Login page autocomplete feature enabled - https://www.youtube.com/watch?v=XNjUfwDmHGc&t=33s
11. Insecure distribution of credentials - When you register in any website or you request for a password reset using forgot password feature, if the website sends your username and password over the email in cleartext without sending the password reset link, then it is a vulnerability.
12. Test for credentials transportation using SSL/TLS certificate - https://www.youtube.com/watch?v=21_IYz4npRs
14. Testing browser cache - https://www.youtube.com/watch?v=2T_Xz3Humdc
15. Bypassing login panel -case 1 - https://www.youtube.com/watch?v=TSqXkkOt6oM
16. Bypass login panel - case 2 - https://www.youtube.com/watch?v=J6v_W-LFK1c




Phase 9 - Attacking access controls (IDOR, Priv esc, hidden files and directories)


Completely unprotected functionalities

2. Finding admin panel and hidden files and directories - https://www.youtube.com/watch?v=Z0VAPbATy1A
3. Finding hidden webpages with dirbusater - https://www.youtube.com/watch?v=--nu9Jq07gA&t=5s

Insecure direct object reference

6. IDOR case 3 (zomato) - https://www.youtube.com/watch?v=tCJBLG5Mayo

Privilege escalation

7. What is privilege escalation - https://www.youtube.com/watch?v=80RzLSrczmc
8. Privilege escalation - Hackme bank - case 1 - https://www.youtube.com/watch?v=g3lv 87cWM
9. Privilege escalation - case 2 - https://www.youtube.com/watch?v=-i4O_hjc87Y





Phase 10 – Attacking Input validations (All injections, XSS and mics)


HTTP verb tampering

1. Introduction HTTP verb tampering - https://www.youtube.com/watch?v=Wl0PrIeAnhs
2. HTTP verb tampering demo - https://www.youtube.com/watch?v=bZlkuiUkQzE

HTTP parameter pollution


3. Introduction HTTP parameter pollution - https://www.youtube.com/watch?v=Tosp-JyWVS4
4. HTTP parameter pollution demo 1 - https://www.youtube.com/watch?v=QVZBl8yxVX0&t=11s
5. HTTP parameter pollution demo 2 - https://www.youtube.com/watch?v=YRjxdw5BAM0
6. HTTP parameter pollution demo 3 - https://www.youtube.com/watch?v=kIVefiDrWUw

XSS - Cross site scripting



10. XSS attack method using burpsuite - https://www.youtube.com/watch?v=OLKBZNw3OjQ
11. XSS filter bypass with Xenotix - https://www.youtube.com/watch?v=loZSdedJnqc
12. Reflected XSS filter bypass 1 - https://www.youtube.com/watch?v=m5rlLgGrOVA
13. Reflected XSS filter bypass 2 - https://www.youtube.com/watch?v=LDiXveqQ0gg
14. Reflected XSS filter bypass 3 - https://www.youtube.com/watch?v=hb_qENFUdOk
15. Reflected XSS filter bypass 4 - https://www.youtube.com/watch?v=Fg1qqkedGUk
16. Reflected XSS filter bypass 5 - https://www.youtube.com/watch?v=NImym71f3Bc
17. Reflected XSS filter bypass 6 - https://www.youtube.com/watch?v=9eGzAym2a5Q
18. Reflected XSS filter bypass 7 - https://www.youtube.com/watch?v=ObfEI84_MtM
19. Reflected XSS filter bypass 8 - https://www.youtube.com/watch?v=2c9xMe3VZ9Q
20. Reflected XSS filter bypass 9 - https://www.youtube.com/watch?v=-48zknvo7LM
21. Introduction to Stored XSS - https://www.youtube.com/watch?v=SHmQ3sQFeLE

SQL injection


39. Part 13 - POST parameter injection blind boolean and time based - https://www.youtube.com/watch?v=411G-4nH5jE&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro&index=10

49. Part 23 - Bypassing addslashes - charset mismatch -

NoSQL injection

50. Introduction to NoSQL injection - https://www.youtube.com/watch?v=h0h37-Dwd_A
51. Introduction to SQL vs NoSQL - Difference between MySQL and MongoDB with tutorial - https://www.youtube.com/watch?v=QwevGzVu_zk
52. Abusing NoSQL databases - https://www.youtube.com/watch?v=lcO1BTNh8r8
53. Making cry - attacking NoSQL for pentesters - https://www.youtube.com/watch?v=NgsesuLpyOg

Xpath and XML injection

54. Introduction to Xpath injection - https://www.youtube.com/watch?v=2_UyM6Ea0Yk&t=3102s
55. Introduction to XML injection - https://www.youtube.com/watch?v=9ZokuRHo-eY
56. Practical 1 - bWAPP - https://www.youtube.com/watch?v=6tV8EuaHI9M
57. Practical 2 - Mutillidae - https://www.youtube.com/watch?v=fV0qsqcScI4
58. Practical 3 - webgoat - https://www.youtube.com/watch?v=5ZDSPVp1TpM
59. Hack admin panel using Xpath injection - https://www.youtube.com/watch?v=vvlyYlXuVxI

LDAP injection

63. Introduction and practical 1 - https://www.youtube.com/watch?v=-TXFlg7S9ks

OS command injection

65. OS command injection in bWAPP - https://www.youtube.com/watch?v=qLIkGJrMY9k
66. bWAAP- OS command injection with Commiux (All levels) - https://www.youtube.com/watch?v=5-1QLbVa8YE

Local file inclusion

67. Detailed introduction - https://www.youtube.com/watch?v=kcojXEwolIs





Remote file inclusion

70. Detailed introduction - https://www.youtube.com/watch?v=MZjORTEwpaw
72. RFI introduction and demo 2 - https://www.youtube.com/watch?v=htTEfokaKsM

HTTP splitting/smuggling

73. Detailed introduction - https://www.youtube.com/watch?v=bVaZWHrfiPw





Phase 11 – Generating and testing error codes


1. Generating normal error codes by visiting files that may not exist on the server - for example visit chintan.php or chintan.aspx file on any website and it may redirect you to 404.php or 404.aspx or their customer error page. Check if an error page is generated by default web server or application framework or a custom page is displayed which does not display any sensitive information.
2. Use BurpSuite fuzzing techniques to generate stack trace error codes - https://www.youtube.com/watch?v=LDF6OkcvBzM





Phase 12 – Weak cryptography testing


1. SSL/TLS weak configuration explained - https://www.youtube.com/watch?v=Rp3iZUvXWlM
2. Testing weak SSL/TLS ciphers - https://www.youtube.com/watch?v=slbwCMHqCkc
3. Test SSL/TLS security with Qualys guard - https://www.youtube.com/watch?v=Na8KxqmETnw
4. Sensitive information sent via unencrypted channels - https://www.youtube.com/watch?v=21_IYz4npRs




Phase 13 – Business logic vulnerability


2. The Difficulties Finding Business Logic Vulnerabilities with Traditional Security Tools - https://www.youtube.com/watch?v=JTMg0bhkUbo&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=2
6. Business Logic Flaws: Abuse Cases: Information Disclosure - https://www.youtube.com/watch?v=HrHdUEUwMHk&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=6

7. Business Logic Flaws: Abuse Cases: iPod Repairman Dupes Apple - https://www.youtube.com/watch?v=8yB_ApVsdhA&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=7
9. Business Logic Flaws: How To Navigate Code Using ShiftLeft Ocular - https://www.youtube.com/watch?v=hz7IZu6H6oE&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=9
10. Business Logic Security Checks: Data Privacy Compliance - https://www.youtube.com/watch?v=qX2fyniKUIQ&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=10


Reference: 
youtube.com
 hackerone.com

0 Comments: