$1999.99
Buy Now
Or preview some of the content.
1666 Minutes of Personalized Content
135 Lectures
26 Assignments
20 Attachments
Certificate of Completion
Lifetime Access to Course & Updates
Satisfaction Guarantee

Training 5+ people?
Contact us for offers and discounts.

Advanced Web Hacking

From OWASP Top 10 to Dynamic SMT Solvers



5.0
( 5 ratings) 18 students enrolled
Created by ZDResearch Training Last updated 9/2018

Description

This course is tailored for all security researchers, penetration testers and web designers who like to receive in-depth knowledge of web application security from a hacker's perspective.

This is the flagship web application security course provided by ZDResearch Training. In this course you will go through a multitude of web application security topics, all accompanied by demos and hands-on labs. Topics will cover traditional OWASP Top 10 issues as well as several other cutting-edge topics, such as HTML5 attacks, Source Code Auditing and Analysis, CAPTCHA bypass and many more.

Advanced Web Hacking course is the product of 10+ years of web application vulnerability research performed by ZDResearch hunters. Not only it will go through some of the typical methods and techniques used to attack and exploit (as well as defend) web applications, it will teach you the delicate tricks of the trade in the process. For example, you will learn how to fully exploit a system that only allows SQL injection into the LIMIT BY clause, or how to bypass taint based web application firewalls.

Pre-Requirements

This course requires basic programming skills, familiarity with HTTP, HTML, CSS, Javascript, at least one server side scripting language besides Javascript (e.g., PHP), as well as a high-speed Internet.

Goals

The graduates of this course will be able to pwn 70%+ of the web applications on the Internet, and should be fully qualified to find bug bounties in popular web applications such as Facebook and Gmail. They would also be able to perform advanced web application security analysis, testing and auditing.

Certification

Upon successful completion of this course, you will receive a completion certificate from Exdemy. You will also be eligible to take ZDResearch Advanced Web Hacker exam, which is based on this course, and receive the ZDResearch Advanced Web Hacker (ZAWH) certificate.

Topics

  • SQL Injection
  • Advanced SQL Injection
  • Command Injection
  • Code Injection
  • XML Injection
  • XSS
  • CSRF
  • HTML5 CORS
  • HTML5 Web Storage
  • HTML5 Cross-Window Messaging
  • HTML5 Access Control
  • Web Sockets
  • HTML Video/Audio
  • Session Management Attacks
  • Web Service Attacks
  • Authentication Attacks
  • Authorization Attacks
  • Single Sign-On Attacks
  • CAPTCHA Bypass
  • HTTP Tampering
  • WAF Bypass
  • COTS Vulnerabilities
  • Redirect Abuse
  • Denial of Service
  • Source Code Auditing
  • Taint Tracking
  • Taint Inference
  • Dynamic Code Analysis
  • Constraint Solving

Requirements

  • Basic Programming
  • HTTP
  • HTML
  • CSS
  • Javascript
  • PHP

Target Audience

  • Web Application Penetration Testers
  • Security Researchers
  • Code Auditors
  • Bug Bounty Hunters
  • Web App Auditors
Expand All 161 items27:46:44

Curriculum

1 Advanced SQL Injection
265 1. Lecture 1 - Prologue
83 2. Lecture 2 - Introduction
85 4. Lecture 4 - Finding SQL Injections Manually
292 5. Assignment 1 - Finding SQL Injection
86 6. Lecture 5 - Protection Strategies
293 7. Assignment 2 - Patch SQL Injection
87 8. Lecture 6 - DBMS Detection
88 9. Lecture 7 - Authentication Bypass
294 10. Assignment 3 - Authentication Bypass
89 11. Lecture 8 - Union-Based Injections
295 12. Assignment 4 - Dump Table
90 13. Lecture 9 - Reading and Writing Files
296 14. Assignment 5 - Write Files
91 15. Lecture 10 - Blind Injections
92 16. Lecture 11 - Double-Blind Injections
297 17. Assignment 6 - Blind Injection
93 18. Lecture 12 - Error-Based Injections
94 19. Lecture 13 - System Takeover
95 20. Lecture 14 - Automated Tools
96 21. Lecture 15 - Bypassing Blacklists
298 22. Assignment 7 - Bypass Blacklists
97 23. Lecture 16 - Order By and Limit Injection
98 24. Lecture 17 - Second Order Injections
299 25. Assignment 8 - Second Order SQL Injection
2 Other Injection Attacks
145 26. Lecture 1 - OS Command Injection
148 27. Lecture 2 - Finding OS Command Injection
300 28. Assignment 1 - Command Injection
150 30. Lecture 4 - Bypassing Filename Filters
151 31. Lecture 5 - Bypassing Filename Filters Demo
153 33. Lecture 7 - Bypassing File Type Filters
154 34. Lecture 8 - Code Injection
301 35. Assignment 2 - Code Injection
155 36. Lecture 9 - File Inclusion Demo
156 37. Lecture 10 - Code Injection Demo
157 38. Lecture 11 - Unsafe Reflection
158 39. Lecture 12 - Object Injection
159 40. Lecture 13 - Object Injection Demo
160 41. Lecture 14 - XXE Injection
161 42. Lecture 15 - XXE Demo
162 43. Lecture 16 - XPath Injection
302 44. Assignment 3 - XPath Injection
3 XSS Attacks
163 45. Lecture 1 - Introduction
164 46. Lecture 2 - Reflective XSS
165 47. Lecture 3 - Reflective XSS Demo
303 48. Assignment 1 - Reflective XSS
166 49. Lecture 4 - Reflective XSS Real World Example
167 50. Lecture 5 - Persistent XSS
168 51. Lecture 6 - Persistent XSS Demo
169 52. Lecture 7 - Persistent XSS Real World Example
170 53. Lecture 8 - DOM XSS
171 54. Lecture 9 - DOM XSS Demo
172 55. Lecture 10 - DOM XSS Real World Example
173 56. Lecture 11 - Mutation XSS
174 57. Lecture 12 - Mutation XSS Demo
175 58. Lecture 13 - Session Hijacking With XSS
304 59. Assignment 2 - Session Hijacking with XSS
176 60. Lecture 14 - Session Hijacking With XSS Demo
177 61. Lecture 15 - Phishing With XSS
178 62. Lecture 16 - XSS Keyloggers
179 63. Lecture 17 - Clickjacking With XSS
180 64. Lecture 18 - Clickjacking With XSS Demo
181 65. Lecture 19 - Cryptocurrency Mining With XSS
182 66. Lecture 20 - Remote Control With XSS
183 67. Lecture 21 - Bypassing XSS Filtering
306 68. Assignment 3 - XSS And Encodings
305 69. Assignment 4 - Bypassing XSS Filters
184 70. Lecture 22 - Preventing XSS
307 71. Assignment 5 - Prevent XSS
4 CSRF Attacks
185 72. Lecture 1 - Introduction
186 73. Lecture 2 - CSRF Demo
187 74. Lecture 3 - CSRF Token
188 75. Lecture 4 - How CSRF Works
189 76. Lecture 5 - GET And POST CSRF
190 77. Lecture 6 - CSRF Via Javascript
309 78. Assignment 1 - Fetch API
191 79. Lecture 7 - File Upload CSRF
192 80. Lecture 8 - Real World CSRF Example
193 81. Lecture 9 - Real World CSRF Protection
5 HTML5 Attacks
194 82. Lecture 1 - Introduction
195 83. Lecture 2 - Cross Window Messaging
196 84. Lecture 3 - Cross Window Messaging Demo
197 85. Lecture 4 - Cross Origin Resource Sharing
199 87. Lecture 6 - WebSockets
200 88. Lecture 7 - WebSocket Hijacking Demo
201 89. Lecture 8 - WebStorage
202 90. Lecture 9 - WebStorage Demo
203 91. Lecture 10 - Content Security Policy
204 92. Lecture 11 - Content Security Policy Demo
205 93. Lecture 12 - Drag & Drop
206 94. Lecture 13 - Drag & Drop XSS
310 95. Assignment 1 - Pastejacking
6 Session Management Attacks
207 96. Lecture 1 - Introduction
208 97. Lecture 2 - Session Hijacking
209 98. Lecture 3 - Session Hijacking Demo
311 99. Assignment 1 - Session Hijacking
210 100. Lecture 4 - Session Fixation
211 101. Lecture 5 - Session Fixation Demo
212 102. Lecture 6 - Session Fixation Real World Example
7 Web Service Attacks
213 103. Lecture 1 - Introduction
214 104. Lecture 2 - Understanding Web Services
215 105. Lecture 3 - Attacking REST
216 106. Lecture 4 - REST API
217 107. Lecture 5 - Input Validation In REST
218 108. Lecture 6 - Access Control In REST
312 109. Assignment 1 - Bypass Access Control
219 110. Lecture 7 - JSON Web Token
220 111. Lecture 8 - JSON Web Token Demo
313 112. Assignment 2 - JSON Web Token
221 113. Lecture 9 - Security Headers In REST
222 114. Lecture 10 - Error Handling In REST
223 115. Lecture 11 - Content Injection Real World Example
224 116. Lecture 12 - Attacking SOAP
225 117. Lecture 13 - Input Validation In SOAP
226 118. Lecture 14 - WSDL Enumeration
227 119. Lecture 15 - WSDL Enumeration Demo
314 120. Assignment 3 - Wordpress Content Injection
228 121. Lecture 16 - SAX Injection
229 122. Lecture 17 - SAX Injection Demo
230 123. Lecture 18 - SOAP SQL Injection Demo
231 124. Lecture 19 - Server Side Request Forgery
232 125. Lecture 20 - SSRF Real World Example
8 Authentication & Authorization Attacks
233 126. Lecture 1 - Introduction
234 127. Lecture 2 - Sniffing Authentication Credentials
235 128. Lecture 3 - Breaking Authorization
236 129. Lecture 4 - Breaking Authorization Demo
315 130. Assignment 1 - HTTP Basic Authentication
237 131. Lecture 5 - HTTP Verb Tampering Demo
238 132. Lecture 6 - Brute Force Attacks
239 133. Lecture 7 - Brute Force Attacks Demo
240 134. Lecture 8 - Brute Force Attacks Demo 2
241 135. Lecture 9 - Bypassing CAPTCHAs
242 136. Lecture 10 - Bypassing CAPTCHAs Demo
243 137. Lecture 11 - Bypassing CAPTCHAs Real World Example
244 138. Lecture 12 - SentryMBA
245 139. Lecture 13 - SentryMBA Demo
316 140. Assignment 2 - SentryMBA
246 141. Lecture 14 - Finding Other Websites On A Server
247 142. Lecture 15 - Bypassing Authorization With Symlinks
248 143. Lecture 16 - Dirty Cow Local Root Exploit
9 Other Attacks
249 144. Lecture 1 - Solving CAPTCHAs With Human APIs
251 146. Lecture 3 - Web Application Firewalls
252 147. Lecture 4 - Mod_Security Demo
253 148. Lecture 5 - Mod_Security Demo 2
254 149. Lecture 6 - Third Party Components
256 151. Lecture 8 - Open Redirect
257 152. Lecture 9 - Open Redirect Real World Example
258 153. Lecture 10 - Denial of Service
259 154. Lecture 11 - Denial of Service Demo
317 155. Assignment 1 - Slowloris Protection
260 156. Lecture 12 - Defending Against DOS
261 157. Lecture 13 - HTTP Response Splitting
262 158. Lecture 14 - HTTP Response Splitting Demo
263 159. Lecture 15 - HTTP Verb Tampering
264 160. Lecture 16 - HTTP Verb Tampering Demo
318 161. Assignment 2 - Cache Poisoning

Reviews

AR
2018-09-25 15:53
Asif Rahman


I was looking for a good web hacking course for a long time!
I give this course 5 stars, because the speaker does not hold any knowledge back and gives many practical exercises.
Rd
2018-09-01 23:25
Ramon de Calle


Having enrolled in three other web hacking courses, I'd rank this one the best so far. The details of hands-on demos, as well as the instrucftor explanations after each demo coupled with online labs help get through any area that I'm a little rusty at.
I have not yet finished this long course, but I've got my money's worth so far.
OM
2018-08-16 21:44
Omid Mohammadi


Hi!
Thanks for your Course.
I just started it now, and watched first two videos.Every thing sounds nice.I'm installing docker to get ready for more serious parts :))
RS
2018-08-05 12:07
Rahul Singh


I have been waiting for this course since July 2016 after taking other ZD Research courses. It finally came out now! The course was well worth waiting for though, very detailed and informative I wish ZD Research made more courses such as this one.