Soumettre la recherche
Mettre en ligne
Web application security - Course overview
•
2 j'aime
•
3,767 vues
Satish b
Suivre
Web Application penetration testing course content.
Lire moins
Lire la suite
Formation
Technologie
Signaler
Partager
Signaler
Partager
1 sur 5
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Session7-XSS & CSRF
Session7-XSS & CSRF
zakieh alizadeh
Using Proxies To Secure Applications And More
Using Proxies To Secure Applications And More
Josh Sokol
S8-Session Managment
S8-Session Managment
zakieh alizadeh
Application Security TRENDS – Lessons Learnt- Firosh Ummer
Application Security TRENDS – Lessons Learnt- Firosh Ummer
OWASP-Qatar Chapter
Web Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing Methodology
Websecurify
Web application vulnerability assessment
Web application vulnerability assessment
Ravikumar Paghdal
Web application security & Testing
Web application security & Testing
Deepu S Nath
Session4-Authentication
Session4-Authentication
zakieh alizadeh
Recommandé
Session7-XSS & CSRF
Session7-XSS & CSRF
zakieh alizadeh
Using Proxies To Secure Applications And More
Using Proxies To Secure Applications And More
Josh Sokol
S8-Session Managment
S8-Session Managment
zakieh alizadeh
Application Security TRENDS – Lessons Learnt- Firosh Ummer
Application Security TRENDS – Lessons Learnt- Firosh Ummer
OWASP-Qatar Chapter
Web Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing Methodology
Websecurify
Web application vulnerability assessment
Web application vulnerability assessment
Ravikumar Paghdal
Web application security & Testing
Web application security & Testing
Deepu S Nath
Session4-Authentication
Session4-Authentication
zakieh alizadeh
Session3 data-validation-sql injection
Session3 data-validation-sql injection
zakieh alizadeh
S5-Authorization
S5-Authorization
zakieh alizadeh
Cross Site Request Forgery Vulnerabilities
Cross Site Request Forgery Vulnerabilities
Marco Morana
3. backup file artifacts - mazin ahmed
3. backup file artifacts - mazin ahmed
Rashid Khatmey
A8 cross site request forgery (csrf) it 6873 presentation
A8 cross site request forgery (csrf) it 6873 presentation
Albena Asenova-Belal
Cross-Site Request Forgery Vulnerability: “A Sleeping Giant”
Cross-Site Request Forgery Vulnerability: “A Sleeping Giant”
Capgemini
Session1-Introduce Http-HTTP Security headers
Session1-Introduce Http-HTTP Security headers
zakieh alizadeh
121 desarrollando aplicaciones-seguras_con_gene_xus
121 desarrollando aplicaciones-seguras_con_gene_xus
GeneXus
Cross Site Request Forgery
Cross Site Request Forgery
Tony Bibbs
Session10-PHP Misconfiguration
Session10-PHP Misconfiguration
zakieh alizadeh
Web application sec_3
Web application sec_3
vhimsikal
Understanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
Daniel Miessler
SSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
Session2-Application Threat Modeling
Session2-Application Threat Modeling
zakieh alizadeh
Cross site scripting
Cross site scripting
Bilal Mazhar MS(IS)Cyber Security II Privacy Professional
Web 2.0 Hacking
Web 2.0 Hacking
blake101
Grey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request Forgery
Christopher Grayson
Introduction to CSRF Attacks & Defense
Introduction to CSRF Attacks & Defense
Surya Subhash
Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2
robin_bene
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
Vishal Kumar
Romulus OWASP
Romulus OWASP
Grupo Gesfor I+D+i
Pentesting web applications
Pentesting web applications
Satish b
Contenu connexe
Tendances
Session3 data-validation-sql injection
Session3 data-validation-sql injection
zakieh alizadeh
S5-Authorization
S5-Authorization
zakieh alizadeh
Cross Site Request Forgery Vulnerabilities
Cross Site Request Forgery Vulnerabilities
Marco Morana
3. backup file artifacts - mazin ahmed
3. backup file artifacts - mazin ahmed
Rashid Khatmey
A8 cross site request forgery (csrf) it 6873 presentation
A8 cross site request forgery (csrf) it 6873 presentation
Albena Asenova-Belal
Cross-Site Request Forgery Vulnerability: “A Sleeping Giant”
Cross-Site Request Forgery Vulnerability: “A Sleeping Giant”
Capgemini
Session1-Introduce Http-HTTP Security headers
Session1-Introduce Http-HTTP Security headers
zakieh alizadeh
121 desarrollando aplicaciones-seguras_con_gene_xus
121 desarrollando aplicaciones-seguras_con_gene_xus
GeneXus
Cross Site Request Forgery
Cross Site Request Forgery
Tony Bibbs
Session10-PHP Misconfiguration
Session10-PHP Misconfiguration
zakieh alizadeh
Web application sec_3
Web application sec_3
vhimsikal
Understanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
Daniel Miessler
SSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
Session2-Application Threat Modeling
Session2-Application Threat Modeling
zakieh alizadeh
Cross site scripting
Cross site scripting
Bilal Mazhar MS(IS)Cyber Security II Privacy Professional
Web 2.0 Hacking
Web 2.0 Hacking
blake101
Grey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request Forgery
Christopher Grayson
Introduction to CSRF Attacks & Defense
Introduction to CSRF Attacks & Defense
Surya Subhash
Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2
robin_bene
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
Vishal Kumar
Tendances
(20)
Session3 data-validation-sql injection
Session3 data-validation-sql injection
S5-Authorization
S5-Authorization
Cross Site Request Forgery Vulnerabilities
Cross Site Request Forgery Vulnerabilities
3. backup file artifacts - mazin ahmed
3. backup file artifacts - mazin ahmed
A8 cross site request forgery (csrf) it 6873 presentation
A8 cross site request forgery (csrf) it 6873 presentation
Cross-Site Request Forgery Vulnerability: “A Sleeping Giant”
Cross-Site Request Forgery Vulnerability: “A Sleeping Giant”
Session1-Introduce Http-HTTP Security headers
Session1-Introduce Http-HTTP Security headers
121 desarrollando aplicaciones-seguras_con_gene_xus
121 desarrollando aplicaciones-seguras_con_gene_xus
Cross Site Request Forgery
Cross Site Request Forgery
Session10-PHP Misconfiguration
Session10-PHP Misconfiguration
Web application sec_3
Web application sec_3
Understanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
SSRF exploit the trust relationship
SSRF exploit the trust relationship
Session2-Application Threat Modeling
Session2-Application Threat Modeling
Cross site scripting
Cross site scripting
Web 2.0 Hacking
Web 2.0 Hacking
Grey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request Forgery
Introduction to CSRF Attacks & Defense
Introduction to CSRF Attacks & Defense
Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
Similaire à Web application security - Course overview
Romulus OWASP
Romulus OWASP
Grupo Gesfor I+D+i
Pentesting web applications
Pentesting web applications
Satish b
AppSec 2007 - .NET Web Services Hacking
AppSec 2007 - .NET Web Services Hacking
Shreeraj Shah
Intro to Web Application Security
Intro to Web Application Security
Rob Ragan
What's new in CEHv11?
What's new in CEHv11?
EC-Council
Assessment methodology and approach
Assessment methodology and approach
Blueinfy Solutions
Ceh certified ethical hacker
Ceh certified ethical hacker
bestip
OWASP Secure Coding
OWASP Secure Coding
bilcorry
Hacking web applications
Hacking web applications
phanleson
Practical web-attacks2
Practical web-attacks2
OWASP (Open Web Application Security Project)
Fraud detection system
Fraud detection system
baladutt
Owasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root Causes
Marco Morana
Secure SDLC for Software
Secure SDLC for Software
Shreeraj Shah
Hack applications
Hack applications
enrizmoore
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
MrityunjayaHikkalgut1
Secure RESTful API Automation With JavaScript
Secure RESTful API Automation With JavaScript
Jonathan LeBlanc
Altitude SF 2017: Security at the edge
Altitude SF 2017: Security at the edge
Fastly
04. xss and encoding
04. xss and encoding
Eoin Keary
Waf bypassing Techniques
Waf bypassing Techniques
Avinash Thapa
2011 and still bruteforcing - OWASP Spain
2011 and still bruteforcing - OWASP Spain
Christian Martorella
Similaire à Web application security - Course overview
(20)
Romulus OWASP
Romulus OWASP
Pentesting web applications
Pentesting web applications
AppSec 2007 - .NET Web Services Hacking
AppSec 2007 - .NET Web Services Hacking
Intro to Web Application Security
Intro to Web Application Security
What's new in CEHv11?
What's new in CEHv11?
Assessment methodology and approach
Assessment methodology and approach
Ceh certified ethical hacker
Ceh certified ethical hacker
OWASP Secure Coding
OWASP Secure Coding
Hacking web applications
Hacking web applications
Practical web-attacks2
Practical web-attacks2
Fraud detection system
Fraud detection system
Owasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root Causes
Secure SDLC for Software
Secure SDLC for Software
Hack applications
Hack applications
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Secure RESTful API Automation With JavaScript
Secure RESTful API Automation With JavaScript
Altitude SF 2017: Security at the edge
Altitude SF 2017: Security at the edge
04. xss and encoding
04. xss and encoding
Waf bypassing Techniques
Waf bypassing Techniques
2011 and still bruteforcing - OWASP Spain
2011 and still bruteforcing - OWASP Spain
Plus de Satish b
Hacking and securing ios applications
Hacking and securing ios applications
Satish b
Forensic analysis of iPhone backups (iOS 5)
Forensic analysis of iPhone backups (iOS 5)
Satish b
iPhone forensics course overview
iPhone forensics course overview
Satish b
iPhone forensics on iOS5
iPhone forensics on iOS5
Satish b
Pentesting iPhone applications
Pentesting iPhone applications
Satish b
padding oracle attack
padding oracle attack
Satish b
Plus de Satish b
(6)
Hacking and securing ios applications
Hacking and securing ios applications
Forensic analysis of iPhone backups (iOS 5)
Forensic analysis of iPhone backups (iOS 5)
iPhone forensics course overview
iPhone forensics course overview
iPhone forensics on iOS5
iPhone forensics on iOS5
Pentesting iPhone applications
Pentesting iPhone applications
padding oracle attack
padding oracle attack
Dernier
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Chameera Dedduwage
mini mental status format.docx
mini mental status format.docx
PoojaSen20
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
ChitralekhaTherkar
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
microwave assisted reaction. General introduction
microwave assisted reaction. General introduction
Maksud Ahmed
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
pboyjonauth
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
anshu789521
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
PoojaSen20
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
eniolaolutunde
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
GeoBlogs
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
Thiyagu K
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
EduSkills OECD
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Sapana Sha
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
Association for Project Management
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology ( Production , Purification , and Application )
Sakshi Ghasle
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
KarinaGenton
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
sanyamsingh5019
Dernier
(20)
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
mini mental status format.docx
mini mental status format.docx
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
microwave assisted reaction. General introduction
microwave assisted reaction. General introduction
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology ( Production , Purification , and Application )
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
Web application security - Course overview
1.
Web Application Security
Course Overview Satish.B Email: satishb3@securitylearn.net
2.
Course Content History of
web application Introduction to web application architecture Uniform Resource Locator (URL) HTTP Introduction HTTP Methods WEBDAV methods Request/Response analysis Security problems with http HTTPS Handshake protocol Record protocol Proxy Man in the middle attack Tools: Burp proxy, Paros proxy, web scarab Encoding Techniques URL Encoding HTML Encoding Unicode Encoding Tools: Burp decoder Profiling Application Spiders, crawlers Search engine discovery Banner Grabbing Robots.txt Analysis of error codes Tools: HttpPrint, netcraft Attacking Authentication Authentication Types Brute force attacks Analyzing Auto complete options Insecure credential transmission Session puzzle attacks Authentication bypass techniques Shoulder surfing 2 http://www.securitylearn.net
3.
CAPTCHA Rebinding attacks
Countermeasures Tools: Bruter, Burp Repeater, Burp Intruder Attacking Authorization Authorization types Parameter tampering Horizontal privilege escalation Vertical privilege escalation Referrer spoofing Cryptography weakness Symmetric cryptography Asymmetric cryptography Substitution cipher Stream cipher Block cipher Steganography SSL cipher testing Cracking hashes Padding oracle attack Cracking ECB encryption Tools: SSLDigger, MD5 crack Attacking Session management Introduction Secure flag HTTPOnly flag Cookie Domain & Path Session Token analysis Session fixation Cookie transmission mechanisms Tools: Burp sequencer Timeout issues Cross site scripting attacks Same origin policy Reflective XSS Stored XSS DOM based XSS Anatomy of XSS Exploitation Impact of XSS XSS Shell 3 http://www.securitylearn.net
4.
XSS & Metasploit
Black list/White list Input validation Output encoding Remediation Tools: Beef SQL injection Error based SQLi Blind SQLi SQLi exploitation Data extraction with UNION queries Data extraction with inference techniques Command execution with SQLi Impact of SQLi Remediation Stored procedures Vs Parameterized queries Tools: SQLMap, Absinthe Cross site request forgery Anatomy of CSRF Remediation CAPTCHA Rebinding attack Tool: CSRFTester URL Redirection attacks Phishing attacks Remediation HTTP Response splitting Cache positioning Command execution Input validation attacks File Uploads Path traversal attacks Local file inclusions Remote file inclusions Command Execution Remediation Techniques Server Configuration issues WEBDAV methods Caching vulnerabilities Directory listing 4 http://www.securitylearn.net
5.
Attacking Web Server
Denial of service attacks Buffer over flows Remediation OWASP Top10 web application risks Scanners Usage of tools Pros, Cons & Problems with scanners IBM- AppScan HP- WebInspect Risk Assessment OWASP Risk Rating methodology Pentest Reports Executive reports Detailed reports Web Application Security Checklist Contact Satish B Email: satishb3@securitylearn.net satishb3@hotmail.com 5 http://www.securitylearn.net
Télécharger maintenant