K_Cyber Security Web Application Defender (CWAD)

1 – Information Gathering_01 Welcome to Information Gathering.
1 – Information Gathering_02 Scoping.
1 – Information Gathering_03 Fingerprinting.
1 – Information Gathering_04 Crawling with Burp Suite.

2 – Injection _01 SQL Injection.
2 – Injection _02 Error-based Injection.
2 – Injection _03 Union-based Injection.
2 – Injection _04 Blind-based Injection.
2 – Injection _05 SQLMap.
2 – Injection _06 Web Shells Pwning.
2 – Injection _07 SQL Injection Mitigation Techniques.
3 – Broken Authentication _01 Broken Authentication.
3 – Broken Authentication _02 Brute Forcing with Burp Suite.
3 – Broken Authentication _03 Brute Forcing with Hydra.
3 – Broken Authentication _04 Brute Forcing with John The Ripper.
3 – Broken Authentication _05 Broken Authentication Mitigation Techniques.
4 – Cross-site Scripting _01 Cross-site Scripting Overview.
4 – Cross-site Scripting _02 Reflected Cross-site Scripting.
4 – Cross-site Scripting _03 Stored Cross-site Scripting.
4 – Cross-site Scripting _04 Attack Scenarios.
4 – Cross-site Scripting _05 Mitigation Strategy.
4 – Cross-site Scripting _06 Lab Finding The Bug.
4 – Cross-site Scripting _07 Lab Verifying The Bug.
4 – Cross-site Scripting _08 Lab Mitigation Techniques.
4 – Cross-site Scripting _09 WordPress WP Membership Plugin XSS CVE-2015-4039.
5 – Cross-site Request Forgery _01 Understanding CSRF.
5 – Cross-site Request Forgery _02 Netflix case study.
5 – Cross-site Request Forgery _03 Mitigation Strategy.
6 – File Inclusion _01 Local File Inclusion (LFI).
6 – File Inclusion _02 LFI – Infecting MySQL Logs.
6 – File Inclusion _03 Pwning – Bypassing file extension check.
6 – File Inclusion _04 LFI Mitigation Techniques.
7 – Web Vulnerability Scanners _01 WebInspect – Configuration.
7 – Web Vulnerability Scanners _02 WebInspect – Web Macro Scanning.
7 – Web Vulnerability Scanners _03 WebInspect – Defects Validation & Reporting.
7 – Web Vulnerability Scanners _04 AppScan Configuration.
7 – Web Vulnerability Scanners _05 Scan Analysis and Power Tools.
7 – Web Vulnerability Scanners _06 Authenticated Scan with Web Macro.
7 – Web Vulnerability Scanners _07 Defects Validation & Reporting.
7 – Web Vulnerability Scanners _08 Acunetix – Scanner Configuration and Web Macros.
7 – Web Vulnerability Scanners _09 Acunteix – Defects validation and Reporting.
8 – Cool Bypassing Techniques _01 Bypassing Authentication by Leveraging MySQL Type Conversion.
8 – Cool Bypassing Techniques _02 Bypassing Input Validation via Unicode Normalization Attack.
8 – Cool Bypassing Techniques _03 Extension check Bypass via Data Stream Wrapper.

Comments