OBJECTIFS

At the end of the course, employees will be able to :


  • Apply a detailed, four-step methodology to your web application penetration tests: reconnaissance, mapping, discovery, and exploitation

  • Analyze the results from automated web testing tools to validate findings, determine their business impact, and eliminate false positives

  • Manually discover key web application flaws

  • Use Python to create testing and exploitation scripts during a penetration test

  • Discover and exploit SQL Injection flaws to determine true risk to the victim organization

  • Create configurations and test payloads within other web attacks

  • Fuzz potential inputs for injection attacks

  • Explain the impact of exploitation of web application flaws

  • Analyze traffic between the client and the server application using tools such as the Zed Attack Proxy and Burp Suite to find security issues within the client-side application code

  • Manually discover and exploit Cross-Site Request Forgery (CSRF) attacks

  • Use the Browser Exploitation Framework (BeEF) to hook victim browsers, attack client software and the network, and evaluate the potential impact that XSS flaws have within an application

  • Perform a complete web penetration test during the Capture-the-Flag exercise to bring techniques and tools together into a comprehensive test

PROGRAMME
  • Introduction and Information Gathering

  • Content Discovery, Authentication, and Session Testing

  • Injection AND XXE

  • XXE

  • CSRF, Logic Flaws, and Advanced Tools

  • Capture the Flag

PÉDAGOGIE

METHODOLOGIE

Laptop Required


EVALUATION



LIVRABLES

Attestation de formation


FORMATEUR

SANS INSTITUTE

Building Titan VI Zone Galaxy Andraharo 101 Antananarivo Madagascar

axian.university@axian-group.com

Building Titan VI Zone Galaxy Andraharo 101 Antananarivo Madagascar

axian.university@axian-group.com

Create a free website with Framer, the website builder loved by startups, designers and agencies.