Web penetration Testing

SquireX > Web penetration Testing

Web Application Penetration Testing Training at squireX is designed to teach the details of web app penetration testing in an immersive environment. Our trainers are experts of the industry and they will teach you Web application analysis, information gathering and enumeration to add to your skill. Our Web Application Penetration Testing course will let you have a hands-on penetration testing experience in our cloud-hosted lab environment. You will be provided with an app demonstrating a vulnerability commonly found in a Web or mobile app. which will help you in learning to assess the app and exploit it like an experienced professional. Thus, during this WAPT course you will learn to:

Consistent increase in the rate of cyber crime has compelled the organizations to deploy a comprehensive security testing framework along with validation across all layers of an application. WAPT has been specifically designed to identify the security vulnerabilities within web-based applications. Our WAPT Online Training will enhance your ability to analyze and evaluate the network, database and application exposure layers. Application penetration assessments also evaluate the risk related with the third party application and therefore, is more popular among all the penetration testing. Knowledge of WAPT makes professional a perfect choice for any organization to secure the web based application against any malicious activities.

  • Basic understanding of HTML, HTTP and JavaScript.
  • Knowledge of PHP code will help although it is not mandatory
  • one year in an information security role, or equivalent experience is recommended.

Web Application Assessment

OWASP Top 10 Vulnerabilities
Threat Modelling Principle
Site Mapping & Web Crawling
Server & Application Fingerprinting
Identifying the entry points
Page enumeration and brute forcing
Looking for leftovers and backup files


Authentication scenarios
User enumeration
Guessing passwords โ€“ Brute force & Dictionary attacks
Default users/passwords
Weak password policy
Direct page requests
Parameter modification
Password flaws
Locking out users
Lack of SSL at login pages
Bypassing weak CAPTCHA mechanisms
Login without SSL


Role-based access control (RBAC)
Authorization bypassing
Forceful browsing
Client-side validation attacks
Insecure direct object reference


Input validation techniques
Blacklist VS. Whitelist input validation bypassing
Encoding attacks
Directory traversal
Command injection
Code injection
Log injection
XML injection โ€“ XPath Injection | Malicious files | XML Entity
bomb
LDAP Injection
SQL injection
Common implementation mistakes โ€“ authentication
Bypassing using SQL Injection
Cross Site Scripting (XSS)
Reflected VS. Stored XSS
Special chars โ€“ โ€˜ & < >, empty


Path traversal
Canonicalization
Uploaded files backdoors
Insecure file extension handling
Directory listing
File size
File type
Malware upload


Session management techniques
Cookie based session management
Cookie properties
Cookies โ€“ secrets in cookies, tampering
Exposed session variables
Missing Attributes โ€“ httpOnly, secure
Session validity after logoff
Long session timeout
Session keep alive โ€“ enable/disable
Session id rotation
Session Fixation
Cross Site Request Forgery (CSRF) โ€“ URL Encoding
Open redirect


Information leak Web Services Assessment
Web Service Testing
OWASP Web Service Specific Testing
Testing WSDL
Sql Injection to Root
LFI and RFI]
OWASP Top 10 Revamp