TypeClassroom Training
CAST 613 Training in Gurgaon


Audience & Prerequisites

Course Outline

Schedule & Fees


Hacking and Hardening Corporate Web App/Web Site – CAST 613 Training

Malware that corrupts desktop computers can divulge FTP credentials or administrator credentials. These credentials can then be used to access the web server, web site, and even other resources on a company’s network. This course is intended to imitate the actions of an invader exploiting weaknesses in network security without the usual risks. It’s very important to protect your data and system as hacking attacks can damage a company’s reputation to the point that they lose revenue and customers.


  • Establish insecure password storage
  • Test for risks in the ‘remember me’ feature
  • Understand unsafe data and sanitization
  • Blind SQL injection
  • Establish input sanitization practices
  • Understand XSS and output encoding
  • Re-authenticate before key actions
  • Test for authentication brute force
  • Harvest data via injection.
  • Automate attacks with Havij

Intended Audience

If you have taken secure coding courses in the past you may think this is going to be the same. Nothing can be further from the truth. This course is a completely different approach. Most developers will tell you that if I knew how the Hackers could get in, it is usually easy to fix. That is just it. The developers have never tried to break in to their own code or someone else’s code. Perhaps they don’t have the skills to do so. Does that make them just an honest person? Perhaps, but In today’s world that is not a good thing but a very bad thing. You must we aware of the things that can happen to you or you will not be able to protect yourself. The hackers actually have it very easy they only need to find 1 hole to get in. The developer must plug all the holes. The developer must keep up to date with the latest security threats.Some developers may argue that it is not the developer’s job to secure the enterprise, that is the security department’s job. That is pure rubbish. Each has a hand in protecting the corporate environment. Each shares this responsibility. While the finger pointing goes on the hacker is enjoying himself with all of your intellectual property, Human Resource Information, or anything else he can monetize.This course is designed so if you understand programming logic you can benefit from this course.

Course Outline                                       Duration: 3 Days

1. Introduction

  • About the course and Author Tim Pierson
  • Why I developed Hacking and Hardening your Corporate Website/WebApp: A developer Perspective
  • Introducing the vulnerable website
  • Using very Expensive Pen testing tools high priced tools like Firefox/Firebug or Chrome’s developer tools (Comes with Chrome).
  • Introducing a few Free Add-ons to Chrome and Firefox, Did I mention they were Free?
  • Monitoring and composing requests using a common proxy like Fiddler, Paros or Burp Suite.
  • Modifying requests and responses in Fiddler to change what goes out and what comes in before Browser Renders it.
  • Browser simply reads code from the top to the bottom. No idea what is good, bad, malicious or otherwise.
  • Surfing the Web is like giving every website you go to a shell on your box!

2. Cryptography Decrypted

  • Introduction
  • Encryption – A Definition
  • Encryption Algorithm
  • Symmetric Encryption
  • Asymmetric Encryption
  • Crack Time
  • Password Policies and why they simply don’t work!
  • Don’t use a Pass Word Every Again! Use a Pass Phrase Instead!
  • Hashing
  • Hash Collisions
  • Common Hash Algorithms
  • Digital Signatures – Proving who we say we are.
  • Digital Certificate Levels – It comes down to Cost!
  • Working with SSL Certificates.
  • We Trust what we Know – True Story.
  • IPSec – Will this solve it all?
  • Public Key Infrastructure
  • HeartBleed – What’s all the Hype? Should we care?
  • Laptop and Portable Encryption: TrueCrypt – BYOB is here or is Coming!
  • Summary

3. Account Management – The Key to it all?

  • Introduction
  • Understanding How Important password strength and attack vectors are
  • My Favorite Slide in the World
  • Passing the Monkey Wrench Technique!
  • Limiting characters in passwords
  • Providing (Emailing credentials) on account creation
  • Account enumeration
  • Denial of service via password reset
  • Correctly securing the reset processes
  • Wall of Shame – Plain Text Offenders
  • How to spot a Secure Web Site – Everyone should try this on their Family.
  • Establishing insecure password storage
  • Testing for risks in the ‘remember me’ feature
  • Re-authenticating before key actions
  • Testing for authentication brute force
  • Summary

4. Parameter Diddling

  • Introduction
  • Identifying untrusted data in HTTP request parameters
  • Capturing requests and using easy tools to manipulating parameters
  • Manipulating application logic via parameters
  • Testing for missing server side validation, if you don’t do it, it’s like having the fat kid watch the pie!
  • Understanding model binding
  • Executing a mass assignment attack
  • HTTP verb tampering – What’s a Verb? Post, Get etc. Are they interchangeable you’d be surprised?
  • Fuzz testing – Spraying that App like a fireman’s sprays a fire with his fire hose, then see if it Hiccups!
  • Summary

5. Transport Layer Protection – Safety During the Commute

  • Introduction
  • The three objectives of transport layer protection
  • Understanding a man in the middle attack, and we all fall victim to it every day!
  • Protecting sensitive data in transit, and at Rest.
  • The risk of sending cookies over insecure connections
  • How loading login forms over HTTP is risky
  • What’s the Solution? Http Everywhere? What about the overhead?
  • Exploiting mixed-mode content
  • The HSTS header
  • Summary

6. Cross Site Scripting (XSS) – Truth Is I just do what I am told

  • Introduction
  • Understanding untrusted data and sanitization
  • Establishing input sanitization practices – Keep it Clean going in
  • Understanding XSS and output encoding
  • Identifying the use of output encoding – and coming back out!
  • 3 types of XSS, Reflected, Stored and DOM
  • Delivering a payload via reflected XSS
  • Testing for the risk of persistent XSSv
  • The X-XSS-Protection header
  • Summary

7. Cookies – Not Just for Hansel and Gretel

  • Introduction
  • Cookies 101 – Everything you wanted to know but were afraid to Ask!
  • Session Management – HTTP is like an Alzheimer’s Patient – Like the Movie, 50 First Dates™ !
  • Understanding Http Only cookies, what are they and why we should use them?
  • Understanding secure cookies. No not putting Grandmas Cookies in a locked Cookie Jar!
  • Disabling Cookies – Do we really need them?
  • Restricting cookie access by path – Now there’s an Idea!
  • Reducing risk with cookie expiration – Keep it short!
  • Using session cookies to further reduce risk
  • Summary

8. Internal Implementation Disclosure – What’s going on inside the Beast

  • Introduction
  • How an attacker builds a website risk profile, Make sure you don’t fit that profile.
  • Server response header disclosure – Tell it like it is, or is that not what you intended?
  • Locating at-risk websites – Making Sure Yours is not one of them
  • HTTP fingerprinting of servers – Determining what your WebApp WebSite is running
  • Disclosure via robots.txt – Tell the World Where not to Look!
  • The risks in HTML source – What your HTML is telling Everyone, whether you know it or not!
  • Internal error message leakage – Error messages that say Way Too Much!
  • Lack of access controls on diagnostic data – First things Hackers Try is to Put the sight in Debug Mode
  • Summary

9. SQL Injection – SQL Injection- What’s a Command, What’s Data?

  • Outline
  • Understanding SQL injection
  • Testing for injection risks – “Using Very High Priced Expensive tools like Chrome and FireFox!”
  • Discovering database structure via injection
  • Harvesting data via injection. Simply print out the Entire Schema under the right conditions.
  • Automating attacks with Havij
  • Blind SQL injection – How the Blind Man can still find Holes
  • Secure app patterns
  • Summary

10. Cross Site Attacks – Same Origin Policy. Everyone Else Breaks it why shouldn’t we?

  • Introduction
  • Understanding cross site attacks – Leveraging the Authority of an approved User
  • Testing for a cross site request forgery risk
  • The role of anti-forgery tokens – A few Things that will help
  • Testing cross site request forgery against APIs
  • Mounting a clickjacking attack – What are you clicking on anyway?
  • Summary

Please write to us at info@itstechschool.com & contact us at +91-9870480053 for the course price & certification cost, schedule & location

Drop Us a Query


For more info kindly contact us.