support@ethicalbyte.in +91 7259787316

WEB PENETRATION TESTING

  • Category: Cyber Security
  • Exam Code: WPT
  • Type of Question: Multiple-choice question
  • Exam Duration: 120 Minutes
  • Passing Score: 60%
  • Enquiry

Description

Web Penetration Testing (Web Pentesting) involves a comprehensive evaluation of web applications to identify security vulnerabilities that could be exploited by attackers. It includes methods such as automated scanning and manual testing to uncover issues like SQL injection, cross-site scripting (XSS), and insecure configurations. The process aims to simulate real-world attack scenarios, providing detailed insights into potential risks and weaknesses. Ultimately, Web Pentesting helps organizations secure their web applications by addressing vulnerabilities before they can be exploited maliciously.

Course Curriculum

  1. Overview of Penetration Testing
    • Penetration Testing
    • Importance of Pen Testing
    • Types of Penetration Testing
  2. Ethical Hacking Concepts
    • White Hat vs. Black Hat vs. Gray Hat
    • Legal Considerations and Compliance
    • Code of Conduct
  1. Web Application Architecture
    • Client-server Model
    • HTTP/HTTPS Protocols
    • Common Web Technologies (HTML, CSS, JavaScript)
  2. Introduction to Web Servers and Databases
    • Web Servers (Apache, Nginx)
    • Databases (SQL, NoSQL)
  3. Setting Up the Testing Environment
    • Building Lab Environment with Virtual Machines and Networks
    • Installing and Configuring Testing Tools
  4. Penetration Testing Frameworks and Tools
    • OWASP ZAP
    • Burp Suite
    • Metasploit
    • Nmap
  1. Introduction to Authentication
    • Brute Force Attacks (Walkthrough)
    • Session Tokens and Sequencer (Walkthrough)
    • Multi-Factor Authentication (Walkthrough)
  2. Introduction to Access Control
    • Insecure Direct Object Reference (IDOR)
    • Walkthrough
  1. Passive Information Gathering
    • WHOIS Lookups
    • DNS Enumeration
    • Google Dorking
  2. Active Information Gathering
    • Port Scanning
    • Banner Grabbing
    • Vulnerability Scanning
  1. Introduction
    • Lab Setup (with instructions)
    • SQL Injection - Introduction
    • SQL Injection - UNION
    • SQL Injection - Blind Part 1
    • SQL Injection - Blind Part 2
    • SQL Injection - Challenge Walkthrough
  2. Cross-Site Scripting (XSS)
    • Reflected XSS
    • Stored XSS
    • DOM Based XSS
    • XSS Challenge Walkthrough
  3. Command Injection - Introduction
    • Command Injection - Basics
    • Command Injection - Blind / Out-of-Band
    • Command Injection - Challenge Walkthrough
  4. Insecure File Upload - Introduction
    • Insecure File Upload - Basics Bypass
    • Insecure File Upload - Magic Bytes
    • Insecure File Upload - Challenge Walkthrough
  5. Attacking Authentication
    • Introduction
    • Bruteforce
    • MFA
    • Challenge Walkthrough
  6. Server-Side Request Forgery (SSRF)
    • Introduction to SSRF
    • Walkthrough
    • Blind SSRF
    • Walkthrough
  7. Cross-Site Request Forgery (CSRF)
    • Introduction to CSRF
    • Walkthrough
  8. XXE (XML External Entity Injection)
    • Introduction to XXE
    • Common XXE Attacks
    • Walkthrough
  9. IDOR - Insecure Direct Object Reference
    • Capstone - Introduction and Solutions
  1. Capture the Flag (CTF) Challenges
  2. Simulated Penetration Testing Engagements
  3. Case Studies of Real-World Attacks