This course will teach you how to set up a true website audit procedure. You will be confronted with the problems of the security of the Web applications. You will study the progress of an audit, both methodologically and technically. The various aspects of an analysis will be highlighted through several practical exercises. This training is intended for people who wish to be able to perform technical tests during an audit or deployment of websites.
In particular, the objectives of the training are as follows:
• Course level HSA
• Mastery of Linux tools
• Knowledge of Web development languages
• Code : AUDWEB
• Duration : 3 jour
• schedule : 8h30 - 17h30
• place : training center, Center Urbain Nord
• Course materials
• 40% demonstration
• 40% of theory
• 20% practical exercises
• Audit Methodology Recap and Action Plan
• Taking information and Scan
• Search and exploitation of vulnerabilities
• Passive recognition
• WHOIS Database
• Active recognition
• Visit the site as a user
• Searching for administration page
• Finding files present by default robots.txt, site map
• Detection of technologies used Contr measures
• Limit network exposure
• Filter access to administration pages and sensitive pages
• Replace verbose error messages with generic messages
TThe different types of scanners and Scanners limits
• Update policy
• Encrypted communications
• Word policy exceeds• Intercompensated insulation• Access to other users' data
• Modification of personal information
• Session Management
• Countermeasures
• Implementation of a Proxy solution
• Cross-site Scripting (XSS)
• Cross-site Request Forgery (CSRF)
• SQL injection and commands• Site Includes Service (SSI)
• Object injection
• Exploitation and Countermeasures
File inclusion
• Inclusion of local files (LFI)
• Inclusion of remote files (RFI)
• Countermeasures
Sending files (Upload)
• Basic exploitation
• Content-type verification
• Blocking dangerous extensions
• Countermeasures
XML External Entity (XXE)
• The entities
• Discover the vulnerability
• Exploitation of the vulnerability
• Countermeasures
Service Side Template Injection (SSTI)
• Example of using Twig
• Example of exploitation on Twig
• Example of exploitation on Flask
• Countermeasures
Do not hesitate to contact our experts for any additional information, study and free calculation of an audit service.