Description
Price: 15.00 USD | Size: 11.0 GB | Duration : 38.38 Hours | 5 Days Lessons |
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | 



4.9
Full Stack Web Attack
Full Stack Web Attack is not an entry-level course. It’s designed to push you beyond what you thought was possible and set you on the path to develop your own workflow for offensive zero-day web research.
This course is developed for web penetration testers, bug hunters and developers that want to make a switch to server-side web security research or see how serious adversaries will attack their web based code.
Students are expected to know how to use Burp Suite and have a basic understanding of common web attacks as well as perform basic scripting using common languages such as python, PHP and JavaScript. Each of the vulnerabilities presented have either been mirrored from real zero-day or are n-day bugs that have been discovered by the author with a focus on not just exploitation, but also on the discovery.
So if you want to learn how to exploit web technologies without client interaction for maximum impact, that is, remote code execution then this is the course for you.
Leave your OWASP Top Ten and CSP bypasses at the door.
TRAINING OVERVIEW
Day 1 Day 2
Introduction
• PHP & Java language fundamentals
• Debugging PHP & Java applications
• Course overview
o Module 1, 2, 3, 4, 5
o Required background
knowledge
• Auditing tips for zero-day discovery
PHP
• Loose typing
• Logic authentication bypasses
• Code injection
• Filter bypass via code reuse
• Patch bypass
Java
• RMI
o JRMP
o Registry attack/JEP290 bypass
• JNDI Injection
o Remote class loading
o Deserialization 101
▪ Existing gadget chains
o Unsafe Reflection
PHP
• Introduction to object instantiation
• Introduction to protocol wrappers
• External entity (XXE) injection
o Full response attacks
o Error response attacks
Full Stack Web Attack / Steven Seeley of Source Incite / 2022 – Page 5
o Blind attacks
Day 3 Day 4
PHP
• Patch analysis and bypass
• Introduction to object injection
• Magic methods
o Customized serialization
o Phar deserialization
o Property oriented
programming (POP)
o Custom gadget chain
creation
• Information disclosure
• Phar planting
• Building an exploit chain to achieve
remote code execution
PHP
• Blocklist bypasses – n-day
vulnerability analysis and
exploitation
Java
• Introduction to reflection
• Expression language injection
• Bypassing URI filters
• URI forward authentication
bypasses
• Deserialization 102
o Custom gadget chains
o Trampoline gadgets
o Exploiting reflection
o Allow list flexibility (ab)use
• Server-Side Template Injection
Reviews
There are no reviews yet.