Website audit

Formations Website audit

OBJECTIF

This course will teach you how to set up a true website audit procedure. You will be confronted with the problems of the security of the Web applications. You will study the progress of an audit, both methodologically and technically. The various aspects of an analysis will be highlighted through several practical exercises. This training is intended for people who wish to be able to perform technical tests during an audit or deployment of websites.

In particular, the objectives of the training are as follows:

  • Understand and exploit the different vulnerabilities of a website
  • Increase the exploitation field of the vulnerabilities for an intrusion test
  • Be able to perform a web application audit

PREREQUISITES

• Course level HSA

• Mastery of Linux tools

• Knowledge of Web development languages

GENERAL INFORMATION

• Code : AUDWEB
• Duration : 3 jour
• schedule : 8h30 - 17h30
• place : training center, Center Urbain Nord

TARGETED AUDIENCE

  • • Security Consultants
  • • Engineers / Technicians
  • • Developers

RESOURCES

• Course materials
• 40% demonstration
• 40% of theory
• 20% practical exercises

PROGRAM

  • Days 1
  • Introduction
  • • Audit Methodology Recap and Action Plan
    • Taking information and Scan
    • Search and exploitation of vulnerabilities

  • Recognition
  • • Passive recognition
    • WHOIS Database
    • Active recognition
    • Visit the site as a user
    • Searching for administration page
    • Finding files present by default robots.txt, site map
    • Detection of technologies used Contr measures
    • Limit network exposure
    • Filter access to administration pages and sensitive pages
    • Replace verbose error messages with generic messages

  • Scan
  • TThe different types of scanners and Scanners limits

  • Days 2
  • Design vulnerabilities
  • • Update policy
    • Encrypted communications
    • Word policy exceeds• Intercompensated insulation• Access to other users' data
    • Modification of personal information
    • Session Management
    • Countermeasures

  • Web Vulnerabilities
  • • Implementation of a Proxy solution
    • Cross-site Scripting (XSS)
    • Cross-site Request Forgery (CSRF)
    • SQL injection and commands• Site Includes Service (SSI)
    • Object injection
    • Exploitation and Countermeasures

  • Days 3
  • Vulnerabilities Web (continued)
  • File inclusion

      • Inclusion of local files (LFI)
      • Inclusion of remote files (RFI)
      • Countermeasures

    Sending files (Upload)

      • Basic exploitation
      • Content-type verification
      • Blocking dangerous extensions
      • Countermeasures

    XML External Entity (XXE)

      • The entities
      • Discover the vulnerability
      • Exploitation of the vulnerability
      • Countermeasures

    Service Side Template Injection (SSTI)

      • Example of using Twig
      • Example of exploitation on Twig
      • Example of exploitation on Flask
      • Countermeasures

  • Challenge Final (continued)

Do not hesitate to contact our experts for any additional information, study and free calculation of an audit service.