SlideShare a Scribd company logo
BY INTERNATIONAL TRAINERS
    Chris Russo's Profile
Chris Russo has been working as an independent consultant for 5 years, reporting several
vulnerabilities in web applications and websites including the Large Hadron Collider, Adobe,
Microsoft, Plenty of fish, E-Harmony & Pirate bay before starting to work as Professional
Penetration Tester at Rapid7 Argentina during the last year. He also developed tools for automatic and


                                                                                                                        LEARN-BREAKING DOWN
progressive analysis of web applications as support during security audits. He currently heads his own
company in Buenos Aires, dedicated to provide corporate solutions in risk analysis, penetration testing
and security trainings.

    Fernando Via's Profile                                                                                              THE SECURITY OF A WEBSITE, WEB APPLICATION
Fernando is an IR security consultant and developer with more than 5 years of experience in the field.
During the last years he has been working on Rapid7 as a professional security consultant. Additionally                 OR COMPANY FOR REAL !
Fernando has been working in the development of Open Source tools for web application security
automation and security improvements of web application frameworks.                                                     IN INDUSTRY , ONE QUESTION OFTEN ARISES : HOW DO I KNOW MY SYSTEM IS SECURE ?

    Why this Course?
Security is about reducing the impact of unpredictable attacks to an organization.
The response to buggy, insecure software is generally doing nothing or installing a product that is a security
countermeasure for the vulnerability (for example, buying a database security solution) instead of fixing the SQL
injection vulnerability in the code itself.
Through lecture, Hands on Labs, Tools, Certification, Course Material and breakout discussion groups, you
will learn about current threat trends across the Internet and their impact on organizational security. You will also
review standard cyber security terminology and compliance requirements, examine sample exploits, and gain hands-
on experience mitigating controls. In a contained lab environment, you will work with XSS Flaws, Sea Surf (XSRF),
Session Fixation, Cookie Spoofing along with LFI & RFI Techniques.

Hack in the Box –Competition concludes the Program!
    Who Should Attend?
•   IT Managers                 • IT Security Specialists      • Government Officials
•   C.I.O                             • C.T.O                          • C.S.O
•   Banking Officials                 • Corporate Sectors              • Telecom Operators
•   Law Enforcement Agencies          • Vulnerability Assessor         • IT Auditors
•   Advocates & Judges                • Computer Forensics Expert      • Network Administrators
•   Software Developer                • Web Application Developers     • Students
•
•
    System Admin                      • Cyber Cells
    Individuals and Enthusiasts interested in the course.
                                                                       • Security auditors
                                                                                                                        Cyberspace is The Nervous System of
Bulk Discounts Available - 1 week Training Program
                                                                                                                        Infrastructure The Control System of a Nation
For (Corporate’s) Rs. 59,000/- (Government & Students) Rs. 49,000/-                                                      GOALS
    For Corporate Bookings, please feel free to contact:                                                                This is the cyber security training course IT professionals have been looking for.”
Dr. Zaki Qureshey                     Soniya                         Office: +91-40 2355 4080                           CGG & E2labs are Jointly Conducting highly innovative Hands on Web Application & Web Penetration Security
+91-90000 62062                       +91-98851 60043                        +91-924 656 4080                           Course, which is geared to provide an actionable skill set that can be utilized to mitigate enterprise risk from day one.
                                                                                                                        "That's why it is crucial that every IT organization learns How to secure a Web-Site, Web-Application, classification &
Visit us : www.cgg.gov.in      www.e2-labs.com                                                                          identification of Vulnerabilities, attack methods and Solutions and by implementing enforceable security policies."
About CGG                                                                                                             About E2Labs
The Centre for Good Governance (CGG) was established with a mandate from the Department of Administrative             E2labs designs, develops & Delivers Information Security Training and Information Assurance Services that meet
Reform & Public Grievances, Government of India and the Government of Andhra Pradesh. CGG undertakes action           Military, Government, Private Sector & Institutional Specifications. In doing so, E2labs have become the De-Facto
research, provides professional advice and conducts change management programs for government departments             standard for Governments and Organizations Worldwide. Est. in 2003, E2labs is one of Top 100 Companies in Asia's
and agencies. Especially citizens for improvement in the policy, processes and functioning of government for better   leading Information Security and also the 1st Anti hacking Academy in Asia.
services to the nation.
                                                                                                                        • Require                                                •   Google hacking
Advice                                                                                                                  • Require_once                                           •   References and examples
The course might be extended in order to cover more detailed techniques and/or additional topics if the                 • Move_uploaded_files
Trainees learning speed allow us.                                                                                                                                                •   Tools for Hackers
                                                                                                                        • fopen
                                                                                                                      • Offensive:                                               •   Hands On Session
TOPICS                                                                                                                  • Running malicious code on Server
                                                                                                                        • Running malicious code on Browser                    DAY 4: SEA SURF: XSRF FLAWS
DAY 1: A QUICK OVERVIEW                                      • Error based SQLi
                                                             • Blind SQLi                                               • How a web shell works                              • Differences in XSS and XSRF
• Usage of web apps
                                                             • Time based                                               • Shell uploading
• Grow                                                                                                                                                                       • When did I send that?
                                                             • OS commanding from SQL                                   • C99
• HTTP and HTTPS                                                                                                                                                             • Offensive:
                                                             • Reading local files                                    • Defensive
• Methods                                                    • Writing local files                                                                                             • Sending POST information
                                                                                                                        • Expressions
• Headers                                                    • Creating reverse connections                             • Google hacking                                       • somewhere else
• Webservices                                                • Evasion Techniques                                       • References and examples                              • Using iframes
                                                             • Using chars                                              • Tools for Hackers                                    • Using source params
• Browser languages
                                                             • Spaces                                                 • Hands On Session                                       • Advanced offensive Techniques
• MySQL and MSSQL                                        •   Google hacking                                                                                                    • XSRF web worms
• Offensive analysis basics                              •   References and examples                                   DAY 3: XSS FLAWS                                      • Defensive:
  • The procedure                                        •   Tools for Hackers
                                                         •   Hands On Session                                         • What is XSS and how does it                            • Tokens
  • Where the issues comes
                                                                                                                        affect the application?                                • Expressions
  • Discover                                                 DAY 2: LFI TECHNIQUES                                    • What is the DOM once again?                            • Check referrer
• What are the possible vulnerabilities                                                                               • Taking control of the user's browser
                                                         • Seeking weakness in                                                                                                 • Crossdomain.xml
  and consequences?                                        • Include                                                  • Small differences, big changes:                        • Doble password check
• A quick overview of the potential threats                • Include_once                                               • XSS                                                • Google hacking
                                                           • Require                                                    • When XSS finds a SQL.                              • References and examples
 DAY 1: ISSUES ON DB                                       • Require_once                                               • DOM based XSS
                                                           • Move_uploaded_files                                                                                             • Tools for Hackers
• What is SQL and how databases work?                                                                                 • Based on:
• Which information is stored in a database                • fopen                                                                                                           • Hands On Session
                                                                                                                        • XSS based on images
• Technologies and versions                              • Offensive:
• The CRUD                                                 • Information Disclosure
                                                                                                                        • XSS based on CSS                                     DAY 5: SESSIONS AND COOKIES
  • Insert data (Create)                                                                                                • XSS based on SVG                                   • Session Fixation
                                                           • Gaining access from LFI
  • Get existing data (Read)                               • Running code inside images                               • Offensive
                                                                                                                                                                             • Cookie spoofing
  • Modify existing data (Update)                          • Running code inside Apache logs                            • Your user is mine
  • Delete data (Delete)                                                                                                                                                     • Unsafe webserver configuarations
                                                           • Running code inside sessions                               • Taking cookies and sessions
• Offensive                                                                                                                                                                    • Banners
                                                           • Running code inside cookies                                • Use encoding
  • The power of ' and “                                                                                                                                                       • Directory Indexing
                                                           • Reading config files                                       • Gaining access from XSS.
  • The procedure                                                                                                                                                              • HTTP authentication
  • Numeric and String based attacks                       • And more…                                                  • DOM redressing
                                                         • Google hacking                                               • XSS and bundle packs for massive ownage.             • Low HTTP methods restrictions
  • Using order by
  • Masking                                              • References and examples                                      • Advanced offensive Techniques                      • Common developers errors
  • The chars                                            • Tools for Hackers                                            • Phishing                                             • Backup files
  • Reading information from the database                • Hands On Session                                                                                                    • Hidden HTML fields
                                                                                                                        • XSS Frameworks
  • Password Grabbing                                    • Seeking weakness
                                                                                                                      • Defensive                                              • Information disclosure
  • Grabbing MSSQL Server hashes                           • Include
  • Inband                                                 • Include_once                                               • Expressions                                        • Hands On Session

More Related Content

PPTX
Keeping Secrets on the Internet of Things - Mobile Web Application Security
PDF
Top Strategies to Capture Security Intelligence for Applications
PDF
Smart Phones Dumb Apps
PDF
Vulnerability Management In An Application Security World
PDF
Social Networks and Security: What Your Teenager Likely Won't Tell You
PDF
Vulnerability Management In An Application Security World: AppSecDC
PDF
The Permanent Campaign
PDF
Declaration of malWARe
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Top Strategies to Capture Security Intelligence for Applications
Smart Phones Dumb Apps
Vulnerability Management In An Application Security World
Social Networks and Security: What Your Teenager Likely Won't Tell You
Vulnerability Management In An Application Security World: AppSecDC
The Permanent Campaign
Declaration of malWARe

What's hot (16)

PDF
Developing Secure Mobile Applications
PPTX
Presentation infra and_datacentrre_dialogue_v2
PDF
The Need For Open Software Security Standards In A Mobile And Cloudy World
PPTX
Vulnerability Management
PDF
Clear and present danger: Cyber Threats and Trends 2017
PDF
Mobile Browser Content Handling
PPTX
Cyberskills shortage: Where is the cyber workforce of tomorrow
PPTX
Defending Enterprise IT - beating assymetricality
PDF
Re-Thinking BYOD Policy.pptx
PPTX
How is Your AppSec Program Doing Compared to Others
PPTX
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
PDF
Information Security: A mindset, not a product
PPTX
An Introduction To IT Security And Privacy - Servers And More
PPTX
Isa Chapters Cyber is Hard presentation v1.0
PDF
Is talent shortage ws marco morana
PPTX
Keynote at the Cyber Security Summit Prague 2015
Developing Secure Mobile Applications
Presentation infra and_datacentrre_dialogue_v2
The Need For Open Software Security Standards In A Mobile And Cloudy World
Vulnerability Management
Clear and present danger: Cyber Threats and Trends 2017
Mobile Browser Content Handling
Cyberskills shortage: Where is the cyber workforce of tomorrow
Defending Enterprise IT - beating assymetricality
Re-Thinking BYOD Policy.pptx
How is Your AppSec Program Doing Compared to Others
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
Information Security: A mindset, not a product
An Introduction To IT Security And Privacy - Servers And More
Isa Chapters Cyber is Hard presentation v1.0
Is talent shortage ws marco morana
Keynote at the Cyber Security Summit Prague 2015
Ad

Similar to E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE (20)

PDF
6-minths-cyber-security-diploma-course.pdf
PDF
6-months-cyber-security-diploma-course.pdf
PDF
Is the Web at Risk?
PDF
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
PDF
Ethical Hacking Class
PPTX
State of the information security nation
PDF
Do You Write Secure Code? by Erez Metula
PDF
Pen test free_01_2012
PPTX
it masters Module 1 updated .pptx
PDF
The Forgotten Customer (Socrates 2011)
PDF
Web application security - Course overview
PDF
Athens Owasp workshop Athens Digital Week 2010
KEY
Opa @ owasp 2010
PPTX
Hp Fortify Pillar
PDF
Introduction to Cybersecurity | IIT(BHU)CyberSec
PDF
Ethical Hacking
PDF
CYBER SECURITY Enginnering course .pdf
PDF
SOHOpelessly Broken
PDF
ISACA T&T Training Week Course Outline
6-minths-cyber-security-diploma-course.pdf
6-months-cyber-security-diploma-course.pdf
Is the Web at Risk?
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
Ethical Hacking Class
State of the information security nation
Do You Write Secure Code? by Erez Metula
Pen test free_01_2012
it masters Module 1 updated .pptx
The Forgotten Customer (Socrates 2011)
Web application security - Course overview
Athens Owasp workshop Athens Digital Week 2010
Opa @ owasp 2010
Hp Fortify Pillar
Introduction to Cybersecurity | IIT(BHU)CyberSec
Ethical Hacking
CYBER SECURITY Enginnering course .pdf
SOHOpelessly Broken
ISACA T&T Training Week Course Outline
Ad

Recently uploaded (20)

PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Insiders guide to clinical Medicine.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Classroom Observation Tools for Teachers
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
VCE English Exam - Section C Student Revision Booklet
FourierSeries-QuestionsWithAnswers(Part-A).pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
TR - Agricultural Crops Production NC III.pdf
Sports Quiz easy sports quiz sports quiz
O7-L3 Supply Chain Operations - ICLT Program
Insiders guide to clinical Medicine.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
human mycosis Human fungal infections are called human mycosis..pptx
Classroom Observation Tools for Teachers
Microbial diseases, their pathogenesis and prophylaxis
Module 4: Burden of Disease Tutorial Slides S2 2025
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
STATICS OF THE RIGID BODIES Hibbelers.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Anesthesia in Laparoscopic Surgery in India
Renaissance Architecture: A Journey from Faith to Humanism

E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE

  • 1. BY INTERNATIONAL TRAINERS Chris Russo's Profile Chris Russo has been working as an independent consultant for 5 years, reporting several vulnerabilities in web applications and websites including the Large Hadron Collider, Adobe, Microsoft, Plenty of fish, E-Harmony & Pirate bay before starting to work as Professional Penetration Tester at Rapid7 Argentina during the last year. He also developed tools for automatic and LEARN-BREAKING DOWN progressive analysis of web applications as support during security audits. He currently heads his own company in Buenos Aires, dedicated to provide corporate solutions in risk analysis, penetration testing and security trainings. Fernando Via's Profile THE SECURITY OF A WEBSITE, WEB APPLICATION Fernando is an IR security consultant and developer with more than 5 years of experience in the field. During the last years he has been working on Rapid7 as a professional security consultant. Additionally OR COMPANY FOR REAL ! Fernando has been working in the development of Open Source tools for web application security automation and security improvements of web application frameworks. IN INDUSTRY , ONE QUESTION OFTEN ARISES : HOW DO I KNOW MY SYSTEM IS SECURE ? Why this Course? Security is about reducing the impact of unpredictable attacks to an organization. The response to buggy, insecure software is generally doing nothing or installing a product that is a security countermeasure for the vulnerability (for example, buying a database security solution) instead of fixing the SQL injection vulnerability in the code itself. Through lecture, Hands on Labs, Tools, Certification, Course Material and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will also review standard cyber security terminology and compliance requirements, examine sample exploits, and gain hands- on experience mitigating controls. In a contained lab environment, you will work with XSS Flaws, Sea Surf (XSRF), Session Fixation, Cookie Spoofing along with LFI & RFI Techniques. Hack in the Box –Competition concludes the Program! Who Should Attend? • IT Managers • IT Security Specialists • Government Officials • C.I.O • C.T.O • C.S.O • Banking Officials • Corporate Sectors • Telecom Operators • Law Enforcement Agencies • Vulnerability Assessor • IT Auditors • Advocates & Judges • Computer Forensics Expert • Network Administrators • Software Developer • Web Application Developers • Students • • System Admin • Cyber Cells Individuals and Enthusiasts interested in the course. • Security auditors Cyberspace is The Nervous System of Bulk Discounts Available - 1 week Training Program Infrastructure The Control System of a Nation For (Corporate’s) Rs. 59,000/- (Government & Students) Rs. 49,000/- GOALS For Corporate Bookings, please feel free to contact: This is the cyber security training course IT professionals have been looking for.” Dr. Zaki Qureshey Soniya Office: +91-40 2355 4080 CGG & E2labs are Jointly Conducting highly innovative Hands on Web Application & Web Penetration Security +91-90000 62062 +91-98851 60043 +91-924 656 4080 Course, which is geared to provide an actionable skill set that can be utilized to mitigate enterprise risk from day one. "That's why it is crucial that every IT organization learns How to secure a Web-Site, Web-Application, classification & Visit us : www.cgg.gov.in www.e2-labs.com identification of Vulnerabilities, attack methods and Solutions and by implementing enforceable security policies."
  • 2. About CGG About E2Labs The Centre for Good Governance (CGG) was established with a mandate from the Department of Administrative E2labs designs, develops & Delivers Information Security Training and Information Assurance Services that meet Reform & Public Grievances, Government of India and the Government of Andhra Pradesh. CGG undertakes action Military, Government, Private Sector & Institutional Specifications. In doing so, E2labs have become the De-Facto research, provides professional advice and conducts change management programs for government departments standard for Governments and Organizations Worldwide. Est. in 2003, E2labs is one of Top 100 Companies in Asia's and agencies. Especially citizens for improvement in the policy, processes and functioning of government for better leading Information Security and also the 1st Anti hacking Academy in Asia. services to the nation. • Require • Google hacking Advice • Require_once • References and examples The course might be extended in order to cover more detailed techniques and/or additional topics if the • Move_uploaded_files Trainees learning speed allow us. • Tools for Hackers • fopen • Offensive: • Hands On Session TOPICS • Running malicious code on Server • Running malicious code on Browser DAY 4: SEA SURF: XSRF FLAWS DAY 1: A QUICK OVERVIEW • Error based SQLi • Blind SQLi • How a web shell works • Differences in XSS and XSRF • Usage of web apps • Time based • Shell uploading • Grow • When did I send that? • OS commanding from SQL • C99 • HTTP and HTTPS • Offensive: • Reading local files • Defensive • Methods • Writing local files • Sending POST information • Expressions • Headers • Creating reverse connections • Google hacking • somewhere else • Webservices • Evasion Techniques • References and examples • Using iframes • Using chars • Tools for Hackers • Using source params • Browser languages • Spaces • Hands On Session • Advanced offensive Techniques • MySQL and MSSQL • Google hacking • XSRF web worms • Offensive analysis basics • References and examples DAY 3: XSS FLAWS • Defensive: • The procedure • Tools for Hackers • Hands On Session • What is XSS and how does it • Tokens • Where the issues comes affect the application? • Expressions • Discover DAY 2: LFI TECHNIQUES • What is the DOM once again? • Check referrer • What are the possible vulnerabilities • Taking control of the user's browser • Seeking weakness in • Crossdomain.xml and consequences? • Include • Small differences, big changes: • Doble password check • A quick overview of the potential threats • Include_once • XSS • Google hacking • Require • When XSS finds a SQL. • References and examples DAY 1: ISSUES ON DB • Require_once • DOM based XSS • Move_uploaded_files • Tools for Hackers • What is SQL and how databases work? • Based on: • Which information is stored in a database • fopen • Hands On Session • XSS based on images • Technologies and versions • Offensive: • The CRUD • Information Disclosure • XSS based on CSS DAY 5: SESSIONS AND COOKIES • Insert data (Create) • XSS based on SVG • Session Fixation • Gaining access from LFI • Get existing data (Read) • Running code inside images • Offensive • Cookie spoofing • Modify existing data (Update) • Running code inside Apache logs • Your user is mine • Delete data (Delete) • Unsafe webserver configuarations • Running code inside sessions • Taking cookies and sessions • Offensive • Banners • Running code inside cookies • Use encoding • The power of ' and “ • Directory Indexing • Reading config files • Gaining access from XSS. • The procedure • HTTP authentication • Numeric and String based attacks • And more… • DOM redressing • Google hacking • XSS and bundle packs for massive ownage. • Low HTTP methods restrictions • Using order by • Masking • References and examples • Advanced offensive Techniques • Common developers errors • The chars • Tools for Hackers • Phishing • Backup files • Reading information from the database • Hands On Session • Hidden HTML fields • XSS Frameworks • Password Grabbing • Seeking weakness • Defensive • Information disclosure • Grabbing MSSQL Server hashes • Include • Inband • Include_once • Expressions • Hands On Session