Seats Available: REGISTRATION CLOSED
Overview
Tired of alert(1)? You think there is more too life than Burp scanner? You went through PentesterLab’s exercises and thought “I WANT MORE!!”? This training is for you!
This 2-day training will get you to the next level. We will look into CORS, the exploitation of recent vulnerabilities (Struts RCE, Shellshock, Heartbleed). We will also get shells using serialisation in multiple languages and find vulnerabilities that you may have missed in the past. Non public variants to known issues will also be detailed.
After a quick overview of what you need to know to attack web applications, we will directly jump to the interesting stuff: Hands-on training and real attacks. The class is a succession of 15 minute explanations on what you need to know, followed by hands-on examples to really understand and exploit vulnerabilities. After the training, you will go home with the course (slides based) and the systems (Linux ISO) to be able to play and refresh your memory!
Key Learning Objectives
– Cross-origin resource sharing
– Struts RCE
– Multiple Serialisation attacks (PHP, Python, Java)
– Jboss web-console
– JWT
– Padding Oracle
– Outbound XML entities attacks
– Heartbleed
– Tricky SQL injections
Who Should Attend
This training is aimed at penetration testers and security professionals who want to improve their Web skills.
The following skills/knowledge are required:
– Exposure to information security technologies
– The ability to use a web proxy like Burp Suite, Paros.
– The ability to write basic scripts in Ruby, Python or Perl.
Hardware / Software Requirements
Laptop with at least 4Gb or RAM and 10Gb of disk with local administrator access.
A virtualisation software (VMware, Virtualbox,..)
A scripting interpreter installed
Burp Suite