About the Course
- The best course available in the market. Compare to believe!
- Comprehensive training on web security testing
- 16 hours of in-classroom workshop time, exclusive of lunch/tea breaks
- Late evening extended time provided on request
- Focus on strong fundamentals
- Elaborate coverage of tools and their comparison
- Focus on web security from testing perspective
- 15+ Hands-On Exercises
- No assumptions about existing knowledge
- Small batch size of 20 for more involved training.
- Content developed over 3 years by the author.
- Well received by testers as well as developers.
Who should take this course?
The course has been specifically designed for someone with none to basic knowledge of web security testing. Testers and Developers who want to explore web security testing from offensive perspective rather than defensive are the target audience for this workshop.
Professor – Rahul Verma
Rahul Verma is Founder of Test Mile and Talent Reboot . He is also the author of RahulVerma.XYZ . He is an advisor and researcher for SALT – School of Applied Learning in Testing. He is an awarded thought leader for his contributions to Indian testing community. He is known for his practical and unified view of software testing. He consults, coaches, mentors and interviews in the areas of software testing, test automation frameworks, agile testing, web security, Python and web performance testing. He has presented, published articles on a wide range of subjects and educated hundreds of testers in the said areas.
Prerequisites on Infrastructure
- Bring your own Windows laptop to work through our hands-on exercises.
- You must have admin rights on the machine with permissions to configure browser settings.
Pre-requisites on knowledge
- None to basic knowledge about programming platforms/technologies
The attendees would be provided with the following:
- Course material
- TesterFox 0.1: A portable FireFox, bundled with 20+ security testing plugins, that I have developed for the attendees
- Portable tools for mind mapping, text editing, text comparison
- Portable web proxies
- Portable Vulnerable app environment for practice
- ( Optional, for corporate workshops, separate charges ) Pre and post-assessment based on objective type or subjective type questions
- ( Optional, for corporate workshops, separate charges ) Post-training on-the-job support for applying the concepts
Costs and Registration Process
- INR 15,000/- per attendee.
- Discounts available for corporate workshops.
- Separate discounts can not be clubbed.
- Discounts for corporate workshops are calculated on the basis of base cost for a single nomination for a public workshop (without group discounts).
- A Service Tax of 12.36% is applicable over and above the cost mentioned in the price table, as per government regulations.
- The cost does not include travel/stay expenses for the participants. They should make these arrangements on their own.
- Full payment needs to be done in advance to block a seat. 75% refund in case of a cancellation from the participant, 100% refund in case of cancellation of the event by Talent Reboot.
- For corporate workshops, the above mentioned costs does not include travel, stay and commute expenses for the facilitator in case of workshops outside Bangalore or any other logistic expenses.
- The costs are applicable only for workshops in India.
* Click the + to see expanded coverage under a section.
1. Foundations of Web
- The Changing Face of the Web
- How It Was
- How It is Now
- Why Web technologies became so popular
2. Foundations of Security
- Where are the security issues in a software
- Basics of Encoding and Encryption
- Security Attributes with Examples – Authentication, Authorization, Confidentiality, Integrity, Non-Repudiation/Accountability, Availability
- Understanding basic web user operations w.r.t. security attributes
- What is the goal of security attacks
- Why the attacks on the Web have become popular
- All Input is Malicious
- Change of Context – Data to Code
3. Under the Hood - Understanding HTTP
- Introduction to HTTP
- Introduction to Web Proxies
- How does a Web Proxy Work
- How to use a Web Proxy using Browser Options and Plugins
- HTTP Request Format
- HTTP Response Format
- HTTP Methods
- HTTP Status Codes
- HTTP Headers
- The key differences between a GET and POST
- Converting a GET into POST and vice versa
- HTTP is stateless
- Session Management
- Session Tokens versus Session
- Hidden Variables
5. Foundations of Web Security
- Cookies from Security Perspective
- Encoding versus Encryption
- Session Management from Security Perspective
- Authentication and Authorization from Security Perspective
- HTML Parameters from Security Perspective
- The Misplaced Trust on Client
- Understanding Web Architecture
7. Survey the Territory
- Mapping an application from security perspective
- Using Browser
- Using Browser and Plugins
- What are the different areas of interest
8. Top Vulnerabilities
- Vulnerability Lists ( Focus on OWASP )
- Injection (Focus on SQL Injection)
- Cross-Site Scripting
- Authentication Flaws
- Session Management Flaws
- Authorization Flaws
- Cross-Site Request Forgery
- Insecure Configuration
- Insecure Storage
- Insecure Transmission
- Redirection Flaws
Hands-On and Brainstorming Excercises
The exercises are conducted using local vulnerable apps which have been designed and developed for the purpose. No public website is used for the exercises, as that would break the Ethics code.
- Creating Basic HTML Links
- Creating Basic HTML Forms
Using Web Proxies
- Understanding how the request is handled at various stages -> browser, TCP, web server, web framework middle layer, web server ( and then DB server, web service etc. if applicable )
- Converting a GET into a POST request and vice versa
Using Browser Plugins
- Proxy Bar, Proxy Button
- Tamper Data
- FireBug / Web Developer
Encoding and Decoding
- URL Encoding
- Base64 Encoding
- Hidden Variables
- Form Data
- Brain-storming on various authentication flaws
- Forgot Password Exercises
Breaking Access Flaws
- Naming conventions from security perspective
- Thinking from the development angle
- Finding hidden directories and parameters
- Manipulating Direct Object References
Breaking Session Management
- Cookie Manipulation
- Understanding SQL using MySQL Database
- Imagining SQL based on the web application context
- String and Numeric SQL Injection
- Understanding when to use which form
- Understanding attack delivery for bug advocacy
Cross-Site Scripting ( XSS )
- Reflected XSS
- Stored XSS
- Understanding Delivery mechanism of XSS (Demonstration)
- Relation to Social Engineering
Testimonials – What the Attendees Say
Before attending this workshop, I had tried learning on my own through different books and websites. The pace of my learning is accelerated through this workshop. It is a hands-on workshop with explanation of concepts followed by exercises. A must attend for anyone who is interested in security testing.
Ajay Balamurugdas ( Co-Founder of WeekendTesting)
Wow! I haven’t thought of security in this way or to this extent. This will change the way I think. I haven’t spent my money, instead Rahul has invested his ideas into my testing.
Ravisurya, Aditi Technologies (Author, TestingGarage)
You made me understand difficult concepts in easy way. I’m impressed with the mind maps.
Very good content, very good explanation.
G.S. Neelakantan, Adobe Systems
Before attending the workshop, I thought I need to be a good developer with strong programming skills. Your workshop has shown me how I could carry my core skill as a functional tester one level higher. This workshop has built confidence into me that I can be a good security tester with
practice and smart usage of tools.
Parimala, Blogger-Co-Founder of Weekend Testing- Test Manager at Moolya Testing Services Pvt. Ltd.
You rocked on Day-2, that’s where you connected all the dots from Day 1. This workshop was an eye-opener for me. Organisation of contents and exercises were great.
Difficult and complex concepts made easy. Some excellent test automation ideas provided. This workshop helped in improving my thinking capabilities as a tester. Not only can I start a career as a security tester but have become a better functional tester anyways.
Sreeja Sreekumar, Software Engineer, CenturyLink Technologies Pvt. Ltd.
The workshop was conducted in a very structured way. Rahul started from the core base concepts and explained them very nicely. These concepts are the pillars of security testing. Then, on this strong base, diffrent types of security testing techniques like SQL Injection, XSS were taught. This helped me in understanding that whatever I was doing, there is a core concept and reason for that. This helps in making learning interesting and will stay long.
Sourabh Nigam, Technical Lead – Testing, CenturyLink Technoligies Pvt. Ltd.
Rahul has excellent knowledge on security testing and he showed how application security testing is very different from functional testing. The best part of the workshop was that we tried different tools like WebGoat, BurpSuite, WebScarab, FireForx Plugins and so on. Various attacks were discussed with hands-on exercises.
Kishore Kuppireddy, Technical Lead, CenturyLink Technoligies Pvt. Ltd.
It was a nice training…probably a sort of wake up call for me. It gives a feeling or rather makes us aware that testing is much beyond GUI testing. The way Rahul took the session motivates us to improve our technical knowledge.
Priya, CenturyLink Technoligies Pvt. Ltd.
The way that you broke the boundaries between different test types was great and a lesson to take back and discuss with colleagues
Shyam (Attendee in a public workshop)