Web Application Pentester Course | WAPC
Course Objective
Setelah menyelesaikan pelatihan ini, peserta akan mendapatkan pengetahuan dan pengalaman dalam dunia penetrasi testing website.
Target Audience
Pelatihan ini akan memberikan pengalaman yang baik untuk setiap orang yang menyukai bidang IT Security.
Prequisites
Peserta memiliki laptop sendiri, menguasai dasar pemrograman website, mengerti linux dan perintah dasarnya.
Course Modules
Module 1 : Pengenalan mengenai Penetrasi Testing
- Penetration testing – Overview
- Penetration testing – do’s and don’ts
- Topologi jaringan dalam lab
- Setup VM/Virtual Box
- Overview HTTP
- Netcat / curl / browser
- Wireshark lab
- Konsep Fingerprinting
- Metode Fingerprinting
- Tools yang dapat digunakan dalam proses fingerprinting
- HTTP Header
- HTTP Request Methods
- HTTP Verb Manipulation
- HTTP Response Codes
- Authentication In HTTP
- Basic Authentication
- Sniff using Wireshark
- Attacking using NMAP NSE
- Attacking using Metasploit
- Remediation
- Possible attack
- Exploiting
- Remediation
- Possible attack
- Exploiting
- Remediation
- Possible attack
- Exploiting
- Remediation
- Possible attack
- Exploiting
- Remediation
- Possible attack
- Exploiting
- Remediation
- Possible attack
- Exploiting
- Remediation
- Understanding cookie and session
- Difference between cookie and session
- Persistent XSS
- Non Persistent XSS
- DOM Based
- Session Hijacking
- Remediation
- CSRF Trigger Tags
- Possible Attack
- Exploiting
- Bypassing CSRF Token
- Remediation
- Combining XSS and CSRF Method
- Understanding SQL Injection
- Error-based SQLi
- Union-based SQLi
- Boolean-based SQLi
- Time-based SQLi
- Auto Enumerating using SQLMAP
- Evading Web Application Firewall
- Remediation
- Bypassing Content-type check
- Bypassing Blacklist in file upload
- Bypassing Blacklist using PHP version
- Bypassing Whitelists using Double Extenstion
- Bypassing GetImageSize() check
- Bypassing using Null Byte Injection Method
- Remediation
- Understanding RFI
- Possible attack
- Exploiting
- Remediation
- Understanding LFI
- Possible attack
- Exploiting
- Remediation
- Understanding Meterpreter
- Create Meterpreter
- Setup Handler
- Understanding Heartbleed Attack
- How to detect
- Possible Attack
- Remediation
- Understanding BREACH Attack
- How to detect
- Possible Attack
- Remediation
- Understanding Poodle Attack
- How to detect
- Possible Attack
- Remediation
- Understanding NoSQL
- How to detect
- Enumerating Data
- Remediation
- Understanding ImageMagick
- How to detect
- Exploiting
- Remediation