{"id":329,"date":"2019-08-07T20:18:18","date_gmt":"2019-08-07T20:18:18","guid":{"rendered":"http:\/\/www.ebruu.com\/?page_id=329"},"modified":"2019-08-07T20:20:29","modified_gmt":"2019-08-07T20:20:29","slug":"web-penetration-testing-training","status":"publish","type":"page","link":"https:\/\/www.ebruu.com\/index.php\/web-penetration-testing-training\/","title":{"rendered":"Web Penetration Testing Training"},"content":{"rendered":"\n<p>We teach the following technical and business logic issues related to web applications and after all topics we push the students to solve our CTFs.<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td>Information\n  Gathering via Whois Query<\/td><\/tr><tr><td>Try to find out all websites hosted on\n  same IP address.<\/td><\/tr><tr><td>Try to\n  find out all websites via reverse dns queries<\/td><\/tr><tr><td>Try to find out all subdomians of the all\n  target domains<\/td><\/tr><tr><td>Perform a full TCP\/UDP port scan for all\n  website&#8217;s IP address.<\/td><\/tr><tr><td>Try to identificate new web interfaces on\n  the different TCP ports.<\/td><\/tr><tr><td>Look at the Google search engine to find\n  out subdomins. Google dorks.<\/td><\/tr><tr><td>Information gathering(subdomains,leaked\n  credentials) via Pastebin\/Github&nbsp;<\/td><\/tr><tr><td>Try to find out new subdomain via DNS\n  Dumpster<\/td><\/tr><tr><td>Perform a bruteforce to DNS server with a\n  good wordlist to identificate new subdomains.<\/td><\/tr><tr><td>Analyse error message, banner information\n  etc for information gathering.<\/td><\/tr><tr><td>Look at the Archive.org records<\/td><\/tr><tr><td>Try to perform subdirectory tests<\/td><\/tr><tr><td>Identificate Directory Listing\n  Vulnerabilities by visiting subdirectory<\/td><\/tr><tr><td>Identificate Directory Listing via Google\n  Dork<\/td><\/tr><tr><td>Try to gather information via robots.txt,\n  elmah.axd, trace.axde<\/td><\/tr><tr><td>Elmah.axd and Trace.axd Session Stealing\n  Tests<\/td><\/tr><tr><td>Try to identificate target operation\n  systems, databases etc<\/td><\/tr><tr><td>Try to find out new files under\n  discovered new subdirectories with different extensions<\/td><\/tr><tr><td>Try to identificate used CMS application\n  on the target system<\/td><\/tr><tr><td>Scan this CMS application with special\n  tools.<\/td><\/tr><tr><td>Try to identificate installed plugins of\n  these CMS and known vulnerabilities on this plugins<\/td><\/tr><tr><td>Search all known vulnerabilities related\n  to CMS version<\/td><\/tr><tr><td>Try to identificate admin pages\n  identification of the target websites.<\/td><\/tr><tr><td>Try to check if there is any backdoor on\n  the target systems with known web backdoors<\/td><\/tr><tr><td>Data transmission security chekcs(HTTP\n  usage, without HSTS header,unsecure SSL\/TLS etc)<\/td><\/tr><tr><td>Discover dangerous HTTP method usage such\n  as PUT and DELETE<\/td><\/tr><tr><td>Username enumeration tests via error or\n  warning messages<\/td><\/tr><tr><td>Username enumeration via mis-developments<\/td><\/tr><tr><td>Brute force testing for web form fields.<\/td><\/tr><tr><td>Try to bypass WAF systems<\/td><\/tr><tr><td>Manuel crawling of the target\n  applications<\/td><\/tr><tr><td>Find out all input fields throughout the\n  target applications<\/td><\/tr><tr><td>Hidden form fields tests<\/td><\/tr><tr><td>Source code review of HTML and javascript\n  files<\/td><\/tr><tr><td>Identifiying and abusing of unused\n  captcha forms<\/td><\/tr><tr><td>CSRF vulnerability check on the sensitive\n  functions of the targets<\/td><\/tr><tr><td>Anti-CSRF token bypass techniques<\/td><\/tr><tr><td>Session manipulation tests<\/td><\/tr><tr><td>Cookie attributes tests<\/td><\/tr><tr><td>&nbsp;Session id weaknesses tests<\/td><\/tr><tr><td>Vulnerabilities on the login functions<\/td><\/tr><tr><td>Login function(authentication) bypass\n  techniques<\/td><\/tr><tr><td>Known and published vulnerabilites on the\n  targets<\/td><\/tr><tr><td>Two-factor authentication bypass\n  techniques<\/td><\/tr><tr><td>Session fixation tests<\/td><\/tr><tr><td>Directory traversal vulnerabilities<\/td><\/tr><tr><td>Authorization issues<\/td><\/tr><tr><td>Try to access other user asssets\n  unauthorized(files,private assets)<\/td><\/tr><tr><td>IDOR tests<\/td><\/tr><tr><td>Try to find out weaknesses on the logout\n  function of targets<\/td><\/tr><tr><td>Privilage escalation tests with different\n  role users<\/td><\/tr><tr><td>Focus on just business logic issues of\n  the target&#8217;s functions<\/td><\/tr><tr><td>HTTP Header tests<\/td><\/tr><tr><td>User agent manipulation test<\/td><\/tr><tr><td>X-Forwarded-For Restriction bypass tests.<\/td><\/tr><tr><td>XSS Tests(reflected,stored,dom,blind)<\/td><\/tr><tr><td>Sql Injection Tests<\/td><\/tr><tr><td>Code injection tests<\/td><\/tr><tr><td>Command Execution tests<\/td><\/tr><tr><td>SSRF Tests(local,remote)<\/td><\/tr><tr><td>LFI\/RFI tests<\/td><\/tr><tr><td>Try to focus on web servis\n  tests(ASMX,restful,WCF)<\/td><\/tr><tr><td>Business and technical tests on the web\n  services<\/td><\/tr><tr><td>Spesific tests for related to used\n  technologies(nodejs,ajax,frameworks etc)<\/td><\/tr><tr><td>Try to use right attack vectos depands on\n  used database\/development platforms<\/td><\/tr><tr><td>Password reset functionality abuse\n  testing<\/td><\/tr><tr><td>Takeover account via spesific\n  functionality of the targets(password change,reset etc)<\/td><\/tr><tr><td>Image Captcha&#8217;s size manipulation DoS\n  tests<\/td><\/tr><tr><td>Application Level DoS tests(abusing\n  functions,BoF etc)<\/td><\/tr><tr><td>Session timeout tests<\/td><\/tr><tr><td>Secure,httponly,HSTS header usage tests<\/td><\/tr><tr><td>Advenced authentication and authorization\n  tests.<\/td><\/tr><tr><td>Open Redirection Tests<\/td><\/tr><tr><td>File upload tests(command\n  execution,stored xss,DoS)<\/td><\/tr><tr><td>LDAP Incjection tests<\/td><\/tr><tr><td>XML injection tests<\/td><\/tr><tr><td>Xml External Entity(XXE) tests<\/td><\/tr><tr><td>Buffer over flow tests<\/td><\/tr><tr><td>Login bypass,DoS via Long payload usage<\/td><\/tr><tr><td>HTTP Response Splitting tests(XSS PoC)<\/td><\/tr><tr><td>HTTP Parameter Pollution Tests(Bypass WAF\n  PoC)<\/td><\/tr><tr><td>Iframe Injection tests<\/td><\/tr><tr><td>LFI via Iframe injections<\/td><\/tr><tr><td>XSS tests via drag-drop<\/td><\/tr><tr><td>XSS tests via filen names of uploaded\n  files<\/td><\/tr><tr><td>Try to discover technical web\n  vulnerabilities via Google dorks<\/td><\/tr><tr><td>Signup Function Tests(takeover\n  account,XSS,SQL or many business logic bugs)<\/td><\/tr><tr><td>Code execution via uploadable excel files<\/td><\/tr><tr><td>Try to discover advenced injection points\n  via FUZZing(wfuzz)<\/td><\/tr><tr><td>Try to enforce the targets to get\n  sensitive informations via error messages<\/td><\/tr><tr><td>Vulnerabilities on the webserver versions<\/td><\/tr><tr><td>Try to determine remotely the encrytion\n  sitiuations of the passwords on the target database.<\/td><\/tr><tr><td>SWF,JAR files decompiling tests If we\n  have on the targets<\/td><\/tr><tr><td>Code execution via SMTP\/IMAP<\/td><\/tr><tr><td>Spesific wordlist creation (crunch,cewl)<\/td><\/tr><tr><td>Phpmyadmin Vulnerabilities(Directory\n  listing,bruteforce,XSS etc)<\/td><\/tr><tr><td>Code execution via Phpmyadmin with mysql\n  into outfile function<\/td><\/tr><tr><td>URL Poisioning Tests<\/td><\/tr><tr><td>Try to use bypassing methos for all\n  technical vulnerabilities<\/td><\/tr><tr><td>DoS via Code Injection<\/td><\/tr><tr><td>Default or predictable password usage\n  tests<\/td><\/tr><tr><td>Post-exploitation via accessed\n  systems(tomcat,wordpress etc)<\/td><\/tr><tr><td>Clickjacking Vulnerability Tests on the\n  important function of the targets<\/td><\/tr><tr><td>Full Automate scan all websites<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We teach the following technical and business logic issues related to web applications and after all topics we push the students to solve our CTFs. Information Gathering via Whois Query Try to find out all websites hosted on same IP address. Try to find out all websites via reverse dns queries Try to find out [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-329","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/pages\/329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/comments?post=329"}],"version-history":[{"count":3,"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/pages\/329\/revisions"}],"predecessor-version":[{"id":333,"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/pages\/329\/revisions\/333"}],"wp:attachment":[{"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/media?parent=329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}