Web Application Pentesting
Web Application Pentesting
We can assure you one thing that our course is one of the best in whole world. And we believe in
end to end and complete exposure to all stages of the Penetration testing.
Hands on environment for you, to try the attacks (here we use samurai framework)
Our course concentrates more on a manual approach so that you can test any
application even without any tools however we also teach extensive tools
(about 150+ tools)
Hands on commercial tools like burp suite pro and Open Source Tools
Explanation with examples for all the owasp top 10 attacks and techniques
(we also cover most of the SANS TOP 25 ).
Module 7: Reconnaissance
Foot printing Domain details (whois) - Technicalinfo.net
OS and Service fingerprinting – Netcraft.com, Banner grabbing, HTTPprint
Google hacking
Load balancer Identification
Spidering a web site (wget, Burp spider)
Application flow charting
Relationship analysis within an application
Software configuration discovery
Module 9: Injections
SQL Injection
Blind SQL Injection
Tools
o Havij
o SQLmap
Command Injection
LDAP Injection
XPATH Injection
SOAP Injection
File Includes
other Injections
Implications of Injections
Test methodology for injections
Remediation’s