0% found this document useful (0 votes)
10 views11 pages

Web Security Course Modules

abc

Uploaded by

Dao Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as KEY, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views11 pages

Web Security Course Modules

abc

Uploaded by

Dao Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as KEY, PDF, TXT or read online on Scribd
You are on page 1/ 11

Web Security 101

Module 1: Security Fundamentals Module 6: Cross-site Scripting


Module 2: Web Fundamentals and Module 7: File Upload + Path
Tools traversal
Module 3: Broken Access Control Module 8: SQL Injection
Module 4: Session related Module 9: Business Logic Errors
Vulnerability + CSRF
Module 10: Other Vulnerabilities
Module 5: Open Redirect + SSRF
Module 1: Security Fundamentals
1. Security Principles
2. Risk Evaluation
3. Web Pentest Methodology
4. OWASP Top Ten 2021
Module 2: Web Fundamentals and Tools
1. Web Components Remind
2. HTTP Protocol
3. Burpsuite
Module 3: Broken Access Control
1. Authentication and Authorization
2. Authentication Vulnerability
3. Authorization Vulnerability
4. Autorize for IDOR hunting
5. Prevention
Module 4: Session related Vulnerability + CSRF
1. Cookies and Sessions
2. Session related Vulnerabilities
3. Cross-site Request Forgery
4. Case-study
5. Prevention
Module 5: Open Redirect + SSRF
1. Open Redirect + SSRF
2. How to find Open redirect and SSRF
3. Case-study
4. Prevention
Module 6: Cross-site Scripting
1. Cross-site Scripting
2. Type of XSS
3. How to find and test for XSS
4. Prevention
Module 7: File Upload + Path Traversal
1. File Upload
2. Exploiting File Upload
3. File upload test-cases
4. Path traversal
5. Common obstacles to exploiting path traversal vulnerabilities
6. Prevention
Module 8: SQL Injection
1. SQL Injection
2. Type of SQL Injection attack
3. How to detect SQL Injection vulnerabilities
4. Prevention
Module 9: Business Logic Errors
1. Race condition
2. Numeric processing
3. Parameter manipulation
4. Prevention
Module 10: Other Vulnerabilities
1. Information disclosure
2. Use components with known vulnerabilities
3. Sending confidential information using GET method

You might also like