SlideShare a Scribd company logo
Web Application Security
      Course Overview




               Satish.B
               Email:
               satishb3@securitylearn.net
Course Content

History of web application
    Introduction to web application architecture

Uniform Resource Locator (URL)

HTTP
        Introduction
        HTTP Methods
        WEBDAV methods
        Request/Response analysis
        Security problems with http

HTTPS
        Handshake protocol
        Record protocol

Proxy
        Man in the middle attack
        Tools: Burp proxy, Paros proxy, web scarab

Encoding Techniques
      URL Encoding
      HTML Encoding
      Unicode Encoding
      Tools: Burp decoder

Profiling Application
        Spiders, crawlers
        Search engine discovery
        Banner Grabbing
        Robots.txt
        Analysis of error codes
        Tools: HttpPrint, netcraft

Attacking Authentication
       Authentication Types
       Brute force attacks
       Analyzing Auto complete options
       Insecure credential transmission
       Session puzzle attacks
       Authentication bypass techniques
       Shoulder surfing

 2                                                   http://www.securitylearn.net
CAPTCHA Rebinding attacks
       Countermeasures
       Tools: Bruter, Burp Repeater, Burp Intruder

Attacking Authorization
       Authorization types
       Parameter tampering
       Horizontal privilege escalation
       Vertical privilege escalation
       Referrer spoofing

Cryptography weakness
      Symmetric cryptography
      Asymmetric cryptography
      Substitution cipher
      Stream cipher
      Block cipher
      Steganography
      SSL cipher testing
      Cracking hashes
      Padding oracle attack
      Cracking ECB encryption
      Tools: SSLDigger, MD5 crack

Attacking Session management
       Introduction
       Secure flag
       HTTPOnly flag
       Cookie Domain & Path
       Session Token analysis
       Session fixation
       Cookie transmission mechanisms
       Tools: Burp sequencer
       Timeout issues

Cross site scripting attacks
       Same origin policy
       Reflective XSS
       Stored XSS
       DOM based XSS
       Anatomy of XSS
       Exploitation
       Impact of XSS
       XSS Shell

 3                                                   http://www.securitylearn.net
XSS & Metasploit
       Black list/White list
       Input validation
       Output encoding
       Remediation
       Tools: Beef

SQL injection
       Error based SQLi
       Blind SQLi
       SQLi exploitation
       Data extraction with UNION queries
       Data extraction with inference techniques
       Command execution with SQLi
       Impact of SQLi
       Remediation
       Stored procedures Vs Parameterized queries
       Tools: SQLMap, Absinthe

Cross site request forgery
       Anatomy of CSRF
       Remediation
       CAPTCHA Rebinding attack
       Tool: CSRFTester

URL Redirection attacks
      Phishing attacks
      Remediation

HTTP Response splitting
      Cache positioning
      Command execution

Input validation attacks
       File Uploads
       Path traversal attacks
       Local file inclusions
       Remote file inclusions
       Command Execution
       Remediation Techniques

Server Configuration issues
       WEBDAV methods
       Caching vulnerabilities
       Directory listing

 4                                                  http://www.securitylearn.net
Attacking Web Server
       Denial of service attacks
       Buffer over flows
       Remediation

OWASP Top10 web application risks

Scanners
      Usage of tools
      Pros, Cons & Problems with scanners
      IBM- AppScan
      HP- WebInspect

Risk Assessment
       OWASP Risk Rating methodology

Pentest Reports
      Executive reports
      Detailed reports

Web Application Security Checklist



Contact
Satish B
Email: satishb3@securitylearn.net
       satishb3@hotmail.com




 5                                          http://www.securitylearn.net
Ad

Recommended

PDF
Session7-XSS & CSRF
zakieh alizadeh
 
PPT
Using Proxies To Secure Applications And More
Josh Sokol
 
PDF
S8-Session Managment
zakieh alizadeh
 
PPTX
Application Security TRENDS – Lessons Learnt- Firosh Ummer
OWASP-Qatar Chapter
 
PDF
Web Application Security 101 - 04 Testing Methodology
Websecurify
 
PPTX
Web application vulnerability assessment
Ravikumar Paghdal
 
PDF
Web application security & Testing
Deepu S Nath
 
PDF
Session4-Authentication
zakieh alizadeh
 
PDF
Session3 data-validation-sql injection
zakieh alizadeh
 
PDF
S5-Authorization
zakieh alizadeh
 
PPT
Cross Site Request Forgery Vulnerabilities
Marco Morana
 
PPTX
3. backup file artifacts - mazin ahmed
Rashid Khatmey
 
PPTX
A8 cross site request forgery (csrf) it 6873 presentation
Albena Asenova-Belal
 
PDF
Cross-Site Request Forgery Vulnerability: “A Sleeping Giant”
Capgemini
 
PDF
Session1-Introduce Http-HTTP Security headers
zakieh alizadeh
 
PPTX
121 desarrollando aplicaciones-seguras_con_gene_xus
GeneXus
 
PPT
Cross Site Request Forgery
Tony Bibbs
 
PDF
Session10-PHP Misconfiguration
zakieh alizadeh
 
PDF
Web application sec_3
vhimsikal
 
PPTX
Understanding Cross-site Request Forgery
Daniel Miessler
 
PPTX
SSRF exploit the trust relationship
n|u - The Open Security Community
 
PDF
Session2-Application Threat Modeling
zakieh alizadeh
 
PPT
Web 2.0 Hacking
blake101
 
PDF
Grey H@t - Cross-site Request Forgery
Christopher Grayson
 
PPTX
Introduction to CSRF Attacks & Defense
Surya Subhash
 
PPTX
Owasp security testing methodlogies –part2
robin_bene
 
PPTX
Deep understanding on Cross-Site Scripting and SQL Injection
Vishal Kumar
 
PDF
Web Security - Introduction v.1.3
Oles Seheda
 
PDF
Web Security - Introduction
SQALab
 

More Related Content

What's hot (20)

PDF
Session3 data-validation-sql injection
zakieh alizadeh
 
PDF
S5-Authorization
zakieh alizadeh
 
PPT
Cross Site Request Forgery Vulnerabilities
Marco Morana
 
PPTX
3. backup file artifacts - mazin ahmed
Rashid Khatmey
 
PPTX
A8 cross site request forgery (csrf) it 6873 presentation
Albena Asenova-Belal
 
PDF
Cross-Site Request Forgery Vulnerability: “A Sleeping Giant”
Capgemini
 
PDF
Session1-Introduce Http-HTTP Security headers
zakieh alizadeh
 
PPTX
121 desarrollando aplicaciones-seguras_con_gene_xus
GeneXus
 
PPT
Cross Site Request Forgery
Tony Bibbs
 
PDF
Session10-PHP Misconfiguration
zakieh alizadeh
 
PDF
Web application sec_3
vhimsikal
 
PPTX
Understanding Cross-site Request Forgery
Daniel Miessler
 
PPTX
SSRF exploit the trust relationship
n|u - The Open Security Community
 
PDF
Session2-Application Threat Modeling
zakieh alizadeh
 
PPT
Web 2.0 Hacking
blake101
 
PDF
Grey H@t - Cross-site Request Forgery
Christopher Grayson
 
PPTX
Introduction to CSRF Attacks & Defense
Surya Subhash
 
PPTX
Owasp security testing methodlogies –part2
robin_bene
 
PPTX
Deep understanding on Cross-Site Scripting and SQL Injection
Vishal Kumar
 
Session3 data-validation-sql injection
zakieh alizadeh
 
S5-Authorization
zakieh alizadeh
 
Cross Site Request Forgery Vulnerabilities
Marco Morana
 
3. backup file artifacts - mazin ahmed
Rashid Khatmey
 
A8 cross site request forgery (csrf) it 6873 presentation
Albena Asenova-Belal
 
Cross-Site Request Forgery Vulnerability: “A Sleeping Giant”
Capgemini
 
Session1-Introduce Http-HTTP Security headers
zakieh alizadeh
 
121 desarrollando aplicaciones-seguras_con_gene_xus
GeneXus
 
Cross Site Request Forgery
Tony Bibbs
 
Session10-PHP Misconfiguration
zakieh alizadeh
 
Web application sec_3
vhimsikal
 
Understanding Cross-site Request Forgery
Daniel Miessler
 
SSRF exploit the trust relationship
n|u - The Open Security Community
 
Session2-Application Threat Modeling
zakieh alizadeh
 
Web 2.0 Hacking
blake101
 
Grey H@t - Cross-site Request Forgery
Christopher Grayson
 
Introduction to CSRF Attacks & Defense
Surya Subhash
 
Owasp security testing methodlogies –part2
robin_bene
 
Deep understanding on Cross-Site Scripting and SQL Injection
Vishal Kumar
 

Similar to Web application security - Course overview (20)

PDF
Web Security - Introduction v.1.3
Oles Seheda
 
PDF
Web Security - Introduction
SQALab
 
PPTX
Security Testing Training With Examples
Alwin Thayyil
 
PPTX
Hacking WebApps for fun and profit : how to approach a target?
Yassine Aboukir
 
PPT
Hacking web applications
phanleson
 
PPTX
State of the information security nation
SensePost
 
PPTX
Application and Website Security -- Fundamental Edition
Daniel Owens
 
PDF
Getting Inside Common Web Security Threats
Andy Longshaw
 
PDF
Web Application Security: Introduction to common classes of security flaws an...
Thoughtworks
 
PDF
Tw noche geek quito webappsec
Thoughtworks
 
PDF
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET Journal
 
PPTX
Attacking Web Applications
Sasha Goldshtein
 
PDF
Secure Coding BSSN Semarang Material.pdf
nanangAris1
 
PDF
Pts syllabus
Maggie Mahlia
 
PPTX
Secure webbrowsing 1
UT, San Antonio
 
PPT
Web application security
Vikas Thange
 
PPT
Web application security
Vikas Thange
 
PPT
Hack applications
enrizmoore
 
PDF
Web Application Penetration Testing
Priyanka Aash
 
DOCX
15.3 Student Guide Web Application Tool TimeOverviewTodays c
MatthewTennant613
 
Web Security - Introduction v.1.3
Oles Seheda
 
Web Security - Introduction
SQALab
 
Security Testing Training With Examples
Alwin Thayyil
 
Hacking WebApps for fun and profit : how to approach a target?
Yassine Aboukir
 
Hacking web applications
phanleson
 
State of the information security nation
SensePost
 
Application and Website Security -- Fundamental Edition
Daniel Owens
 
Getting Inside Common Web Security Threats
Andy Longshaw
 
Web Application Security: Introduction to common classes of security flaws an...
Thoughtworks
 
Tw noche geek quito webappsec
Thoughtworks
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET Journal
 
Attacking Web Applications
Sasha Goldshtein
 
Secure Coding BSSN Semarang Material.pdf
nanangAris1
 
Pts syllabus
Maggie Mahlia
 
Secure webbrowsing 1
UT, San Antonio
 
Web application security
Vikas Thange
 
Web application security
Vikas Thange
 
Hack applications
enrizmoore
 
Web Application Penetration Testing
Priyanka Aash
 
15.3 Student Guide Web Application Tool TimeOverviewTodays c
MatthewTennant613
 
Ad

More from Satish b (7)

PPTX
Hacking and securing ios applications
Satish b
 
PDF
Forensic analysis of iPhone backups (iOS 5)
Satish b
 
PDF
iPhone forensics course overview
Satish b
 
PPT
iPhone forensics on iOS5
Satish b
 
PPT
Pentesting web applications
Satish b
 
PPTX
Pentesting iPhone applications
Satish b
 
PPT
padding oracle attack
Satish b
 
Hacking and securing ios applications
Satish b
 
Forensic analysis of iPhone backups (iOS 5)
Satish b
 
iPhone forensics course overview
Satish b
 
iPhone forensics on iOS5
Satish b
 
Pentesting web applications
Satish b
 
Pentesting iPhone applications
Satish b
 
padding oracle attack
Satish b
 
Ad

Recently uploaded (20)

PDF
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
PPTX
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
PPTX
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
 
PPTX
How to use _name_search() method in Odoo 18
Celine George
 
PPTX
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
PPTX
How to use search fetch method in Odoo 18
Celine George
 
PPTX
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
 
PPTX
How to Customize Quotation Layouts in Odoo 18
Celine George
 
PPTX
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
Ronisha Das
 
PDF
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
PPTX
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
 
PPTX
How to Manage Different Customer Addresses in Odoo 18 Accounting
Celine George
 
PPTX
How to Add New Item in CogMenu in Odoo 18
Celine George
 
PPTX
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
IIT Kharagpur Quiz Club
 
PDF
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
PPTX
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
PPTX
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
PPTX
List View Components in Odoo 18 - Odoo Slides
Celine George
 
PPT
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
PPTX
June 2025 Progress Update With Board Call_In process.pptx
International Society of Service Innovation Professionals
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
 
How to use _name_search() method in Odoo 18
Celine George
 
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
How to use search fetch method in Odoo 18
Celine George
 
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
 
How to Customize Quotation Layouts in Odoo 18
Celine George
 
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
Ronisha Das
 
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
 
How to Manage Different Customer Addresses in Odoo 18 Accounting
Celine George
 
How to Add New Item in CogMenu in Odoo 18
Celine George
 
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
IIT Kharagpur Quiz Club
 
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
List View Components in Odoo 18 - Odoo Slides
Celine George
 
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
June 2025 Progress Update With Board Call_In process.pptx
International Society of Service Innovation Professionals
 

Web application security - Course overview

  • 1. Web Application Security Course Overview Satish.B Email: [email protected]
  • 2. Course Content History of web application Introduction to web application architecture Uniform Resource Locator (URL) HTTP Introduction HTTP Methods WEBDAV methods Request/Response analysis Security problems with http HTTPS Handshake protocol Record protocol Proxy Man in the middle attack Tools: Burp proxy, Paros proxy, web scarab Encoding Techniques URL Encoding HTML Encoding Unicode Encoding Tools: Burp decoder Profiling Application Spiders, crawlers Search engine discovery Banner Grabbing Robots.txt Analysis of error codes Tools: HttpPrint, netcraft Attacking Authentication Authentication Types Brute force attacks Analyzing Auto complete options Insecure credential transmission Session puzzle attacks Authentication bypass techniques Shoulder surfing 2 http://www.securitylearn.net
  • 3. CAPTCHA Rebinding attacks Countermeasures Tools: Bruter, Burp Repeater, Burp Intruder Attacking Authorization Authorization types Parameter tampering Horizontal privilege escalation Vertical privilege escalation Referrer spoofing Cryptography weakness Symmetric cryptography Asymmetric cryptography Substitution cipher Stream cipher Block cipher Steganography SSL cipher testing Cracking hashes Padding oracle attack Cracking ECB encryption Tools: SSLDigger, MD5 crack Attacking Session management Introduction Secure flag HTTPOnly flag Cookie Domain & Path Session Token analysis Session fixation Cookie transmission mechanisms Tools: Burp sequencer Timeout issues Cross site scripting attacks Same origin policy Reflective XSS Stored XSS DOM based XSS Anatomy of XSS Exploitation Impact of XSS XSS Shell 3 http://www.securitylearn.net
  • 4. XSS & Metasploit Black list/White list Input validation Output encoding Remediation Tools: Beef SQL injection Error based SQLi Blind SQLi SQLi exploitation Data extraction with UNION queries Data extraction with inference techniques Command execution with SQLi Impact of SQLi Remediation Stored procedures Vs Parameterized queries Tools: SQLMap, Absinthe Cross site request forgery Anatomy of CSRF Remediation CAPTCHA Rebinding attack Tool: CSRFTester URL Redirection attacks Phishing attacks Remediation HTTP Response splitting Cache positioning Command execution Input validation attacks File Uploads Path traversal attacks Local file inclusions Remote file inclusions Command Execution Remediation Techniques Server Configuration issues WEBDAV methods Caching vulnerabilities Directory listing 4 http://www.securitylearn.net
  • 5. Attacking Web Server Denial of service attacks Buffer over flows Remediation OWASP Top10 web application risks Scanners Usage of tools Pros, Cons & Problems with scanners IBM- AppScan HP- WebInspect Risk Assessment OWASP Risk Rating methodology Pentest Reports Executive reports Detailed reports Web Application Security Checklist Contact Satish B Email: [email protected] [email protected] 5 http://www.securitylearn.net