SlideShare a Scribd company logo
1 of 46
Web Application Penetration Testing
Ebrahim Hegazy – Www.Security4Arabs.com
About Myself
● Ebrahim Hegazy (@Zigoo0)
● 2009 → Junior Linux System Administrator
● 2011 → Security Engineer
● 2013 → Cyber Security Analyst (ThreatIntel)
● 2014 → Cyber Security Consultant (Pentesting)
● 2015 → Sr. Systems Security Engineer
● 2017 → Sr. Cyber Security Consultant
● Bug Bounty Hunter since 2013 (Yahoo, Google, Telekom.de,
Avira, Paypal, Barracuda, Facebook, Twitter ….. And more.)
● Speaker for multiple international security conferences
Course Target?
● ‫مشاركة‬
‫العلم‬
● ‫إثراء‬
‫المحتوي‬
‫العربي‬
‫في‬
‫هذا‬
‫المجال‬
● ‫التركيز‬
‫علي‬
‫التطبيق‬
‫العملي‬
‫في‬
‫جميع‬
‫الدروس‬
● ‫إعطاء‬
‫الفرصة‬
‫للجميع‬
‫من‬
‫خالل‬
‫مجانية‬
‫الكورس‬
● ‫كسر‬
‫الخوف‬
‫من‬
‫المصطلحات‬
‫المعقدة‬
● ‫تنمية‬
‫مهارات‬
‫المتدربين‬
‫بشرح‬
‫أساسيات‬
‫أكثر‬
‫من‬
‫مجال‬
● ‫صدقة‬
‫جارية‬
‫لي‬
‫ولوالدي‬
‫رحمه‬
‫هللا‬
Course Agenda
1) Downloading & Installing Course
Requirements
2) Linux Basics
3) BurpSuite and how to use it
4) Introduction Topics
5) Web Applications Vulnerabilities (Easy Level)
6) Web Applications Vulnerabilities (Medium
Level)
7) Advanced Web Applications Vulnerabilities
● Course Requirements
● Installing necessarily browser plugins
(Wappalyzer, FlagFox, FoxyProxy, SEO Status
PageRank/Alexa Toolbar, Tamper data)
● Virtualbox
● Ubuntu & Windows
● Java & Burp Suite
First Session
● Deep dive into data leaks
(Haveibeenpwned.com & Shodan.io)
● ‫سنقوم‬
‫في‬
‫هذا‬
‫الدرس‬
‫بشرح‬
‫كيف‬
‫تمت‬
‫عمليات‬
‫اإلختراق‬
‫علي‬
‫المواقع‬
‫العمالقه‬
‫وكيف‬
‫تم‬
‫تسريب‬
‫مليارات‬
‫من‬
‫الحسابات‬
‫اإللكترونية‬
‫في‬
‫الفترة‬
‫األخيرة‬
● https://hacked-emails.com/api?q=$Email$
Part (1) - Linux Basics
● Introduction to Linux.
● Packages & installation process
● Command line examples
● (man, apt-get, apt-cache, find, curl, wget,
touch, >, >>, |, ;, head, tail, grep, cut, sort,
nano, &, ps, df, top, files permissions)
Intro to Linux
● Open Source Technology
● Hackers Friendly
● Easy packages installation
● Lots of flavors
● Etc etc
● Files Permissions
Your Today Task
● Your today task is to:
− install LAMP stack
− Create a file, allow access to that file to root user
ONLY.
− You learned how to list processes, can you list p sub-
processes?
− RHCE (http://muhammedessa.com/portfolio-
item/rhel7-rhcsa-rhce/)
Part (1) - Introduction Topics
● 1- OSI Model in a Nutshell (Life of a Packet)
● 2- Wireshark & NetworkMiner
● 3- TCP/UDP/HTTP/HTTPS Protocols
● 3- Nmap basics
● 4- HTTP Methods & HTTP Response Types
● 5- HTTP Headers
● 6- Web Authentication Methods, Cookies,
Sessions
● 7- Encryption, Encoding, Hashing
● Encryption, Encoding, Hashing
● Hashing: irreversible mathematical function
that converts user input into a fixed size
output. (used for Integrity checks)
● Encryption: converting human readable
data/message into cipher-text, so only a
person holding the right KEY can decrypt the
message. (used for security purposes,
authentication and authorization)
● Encoding: The purpose of encoding is to
transform data so that it can be properly (and
Hashing
● Irreversible (One way function)
● Fixed output size
● Examples: md4, md5, sha1, sha2 etc
● Demo time.
Encoding
● The purpose of encoding is to transform data
so that it can be properly (and safely)
consumed by a different type of system.
● Example: base64, rot13, Hex, URL, etc etc
● Demo Time!
Encryption
● Symmetric: uses the same key to encrypt and
decrypt.
● Examples: AES, DES, 3DES, TwoFish,
BlowFish
● Asymmetric: uses public key for encryption
and private key for decryption.
● Examples: RSA, DH, DSA, ECDH etc
● Demo Time! :D
Asymmetric
Encryption Demo
● Caesar Cipher (Symmetric)
● RSA (Asymmetric)
● Certificate Chain
● Browser trusted CA’s
● Generate your own public & private keys.
Task
● Your task for today is to watch this video:
https://www.youtube.com/watch?v=eun8LJQ7YZs
● What is OCSP? Why we need it?
● What is root, Intermediate Certificate?
● CISSP All in one exam guide (7)
OSI Model
● What happens when I open
https://www.google.com/ in my browser?
● OSI Model
● How HTTPS Works?
TCP vs UDP
● Every packet has:
● Source IP, Source Port, Destination IP,
Destination Port.
● TCP
● How it works? Example attack? What is it
used for? Example protocols?
● UDP
● How it works? Example attack? What is it
used for? Example protocols?
TCP 3 way Handshake demo
● Wireshark Demo of how TCP 3 way
handshake works.
What is DNS and how it works?
● Domain Name System
● How it works?
● Known attacks
● Different Record Types
● Known attacks
● DNS Poisoning
● Subdomain Takeover
● DNS Cache Snooping
● DNS Amplification Attacks (DDOS)
● Different Record Types
● A
● AAAA
● MX
● CNAME (Alias → Subdomain Takeover)
● PTR
● Tools: dig, nslookup, mxtoolbox.com
Nmap
● What is Nmap and why we need it?
● Nmap basics
● Advance Nmap
BurpSuite
● What is Burp and why we need it?
● A Journey into Burp Tabs
● Burp configuration
● Get your hands dirty using burp
● Burp Documentation:
https://portswigger.net/burp/help/contents.html
BurpSuite
● What is Burp and why we need it?
HTTP Methods, Headers and status codes
● HTTP Protocol
● HTTP Methods (GET, POST, DELETE,
OPTIONS, HEAD ….)
● HTTP Request Headers
● HTTP Response Headers
● HTTP Status Codes
● Tasks
Tasks
● What is the difference between Cookies and
Session
● What is 307 status code?
● What is WebDav?
PHP GET vs POST
● Writing your first GET and POST request
(http://www.security4arabs.com/2015/04/03/ho
w-to-start-in-webapps-security/)
● Handling user input
● Filtering user input
● XSS into demo
● Client Side vs Server side
XSS (Cross Site Scripting)
● Reflected XSS
● Stored XSS
● Dom based XSS
● Demo Time
− Google XSS Game
− Testphp.vulnweb.com
How to Mitigate XSS
● Response Headers
● Filter User input
● Restrict user input
● Client Side vs Server Side.
SOP, CORS, CSP
● Same origin policy requires the source Host
to be the same protocol, same hostname and
same port in order to read responses from
other hostname. Every browser plugin has its
own SOP (Flash, Java, Silverlight)
● Cross Origin Resource Sharing is a response
header that allows cross origin requests.
● Content Security Policy controls which
hostname is able to execute javascript, fonts,
css and/or images on the target server.
Advanced XSS
● Using XSS an attacker can steal user cookies,
modify the page content, inject extra headers
and more.
● Demo: http://185.45.192.228/stealer-xss/js.js
− js.js → the java script code that will steal the user
cookies
− Demo.php → PHP code to store user cookies and
other user information
− Logs.txt → user data/cookies will be stored here.
XSSI
● Cross Site Scripting Inclusion occurs when a
dynamically generated javascript files holds
users confidential information.
● JavaScript files doesn’t respect the SOP.
Solving XSS challenges.
● Before we start, what are:
− URL vs URI, Hostname, Domain Name, TLD,
Subdomain, Backend, Frontend, and Endpoint.
− Client Side & Server Side.
● Challenges: http://185.45.192.228/xssChall/
− Locating XSS payloads, html5sec.org and so on.
− On* event handlers
− Testing “ > < with Burp Intruder.
− Rapid testing of XSS payloads
− String encoding: https://mothereff.in/html-entities
CSRF – Cross-site request forgery
● What is CSRF? Example?
● DEMO
● Auto form submit
● CSRF vs SOP
● CSRF Tokens and extra headers
● Live demo on Twitter
● Mitigation Techniques
Lets earn some money!
● Bug bounty programs
● Bug bounty platforms:
− Hackerone, Bugcrowd, SynAck
− Vulbox, zerocopter, hackenproof.com
● Other BBP (Google, Facebook, Telekom.de)
Lets earn some money!
● How to get started with Hackerone
− Register
− Find a nice target and read the policy
− Start to hunt!
− Private programs vs Public programs.
● How to write a nice report? CVSS? Markdown?
● Following up on reports? Any updates?
Following up on reports
Lets earn some money!
● Got a bounty, now what?
● Tax forms?
Information disclosure
● Backup files (zip,tar,tgz,sql,rar,tar.gz…)
● Hidden files (.FileName)
● Source code repositories (.git, .svn)
● Source code files (.old,.bak,.php~,.swp)
● JavaScript files
● Github repositories (search github)
Information disclosure
● https://hackerone.com/reports/396467
● Tool to clone git repos to search it locally
● Dirsearch tool / Dirbuster
● Extending dirsearch list (Bo0om)
● Git / SVN extractor
● All files are on Github repo @zigoo0

More Related Content

Similar to Course_Presentation cyber --------------.pptx

Hacking Vulnerable Websites to Bypass Firewalls
Hacking Vulnerable Websites to Bypass FirewallsHacking Vulnerable Websites to Bypass Firewalls
Hacking Vulnerable Websites to Bypass FirewallsNetsparker
 
Pen Testing Development
Pen Testing DevelopmentPen Testing Development
Pen Testing DevelopmentCTruncer
 
Scriptless Attacks - Stealing the Pie without touching the Sill
Scriptless Attacks - Stealing the Pie without touching the SillScriptless Attacks - Stealing the Pie without touching the Sill
Scriptless Attacks - Stealing the Pie without touching the SillMario Heiderich
 
PHP BASIC PRESENTATION
PHP BASIC PRESENTATIONPHP BASIC PRESENTATION
PHP BASIC PRESENTATIONkrutitrivedi
 
Looking for Vulnerable Code. Vlad Savitsky
Looking for Vulnerable Code. Vlad SavitskyLooking for Vulnerable Code. Vlad Savitsky
Looking for Vulnerable Code. Vlad SavitskyVlad Savitsky
 
Security and why you need to review yours.
Security and why you need to review yours.Security and why you need to review yours.
Security and why you need to review yours.David Busby, CISSP
 
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...bugcrowd
 
AWS big-data-demystified #1.1 | Big Data Architecture Lessons Learned | English
AWS big-data-demystified #1.1  | Big Data Architecture Lessons Learned | EnglishAWS big-data-demystified #1.1  | Big Data Architecture Lessons Learned | English
AWS big-data-demystified #1.1 | Big Data Architecture Lessons Learned | EnglishOmid Vahdaty
 
Node.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scaleNode.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scaleDmytro Semenov
 
PHP and Application Security - OWASP Road Show 2013
PHP and Application Security - OWASP Road Show 2013PHP and Application Security - OWASP Road Show 2013
PHP and Application Security - OWASP Road Show 2013rjsmelo
 
Security .NET.pdf
Security .NET.pdfSecurity .NET.pdf
Security .NET.pdfAbhi Jain
 
Egress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data ExfiltrationEgress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data ExfiltrationCTruncer
 
XP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsXP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsVlad Fedosov
 
Ever Present Persistence - Established Footholds Seen in the Wild
Ever Present Persistence - Established Footholds Seen in the WildEver Present Persistence - Established Footholds Seen in the Wild
Ever Present Persistence - Established Footholds Seen in the WildCTruncer
 
DevOops & How I hacked you DevopsDays DC June 2015
DevOops & How I hacked you DevopsDays DC June 2015DevOops & How I hacked you DevopsDays DC June 2015
DevOops & How I hacked you DevopsDays DC June 2015Chris Gates
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Testdecatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Testdecatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Testdecatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Testdecatv
 

Similar to Course_Presentation cyber --------------.pptx (20)

Hacking Vulnerable Websites to Bypass Firewalls
Hacking Vulnerable Websites to Bypass FirewallsHacking Vulnerable Websites to Bypass Firewalls
Hacking Vulnerable Websites to Bypass Firewalls
 
Pen Testing Development
Pen Testing DevelopmentPen Testing Development
Pen Testing Development
 
Scriptless Attacks - Stealing the Pie without touching the Sill
Scriptless Attacks - Stealing the Pie without touching the SillScriptless Attacks - Stealing the Pie without touching the Sill
Scriptless Attacks - Stealing the Pie without touching the Sill
 
PHP BASIC PRESENTATION
PHP BASIC PRESENTATIONPHP BASIC PRESENTATION
PHP BASIC PRESENTATION
 
Looking for Vulnerable Code. Vlad Savitsky
Looking for Vulnerable Code. Vlad SavitskyLooking for Vulnerable Code. Vlad Savitsky
Looking for Vulnerable Code. Vlad Savitsky
 
Security and why you need to review yours.
Security and why you need to review yours.Security and why you need to review yours.
Security and why you need to review yours.
 
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
 
AWS big-data-demystified #1.1 | Big Data Architecture Lessons Learned | English
AWS big-data-demystified #1.1  | Big Data Architecture Lessons Learned | EnglishAWS big-data-demystified #1.1  | Big Data Architecture Lessons Learned | English
AWS big-data-demystified #1.1 | Big Data Architecture Lessons Learned | English
 
Node.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scaleNode.js Web Apps @ ebay scale
Node.js Web Apps @ ebay scale
 
PHP and Application Security - OWASP Road Show 2013
PHP and Application Security - OWASP Road Show 2013PHP and Application Security - OWASP Road Show 2013
PHP and Application Security - OWASP Road Show 2013
 
Security .NET.pdf
Security .NET.pdfSecurity .NET.pdf
Security .NET.pdf
 
Egress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data ExfiltrationEgress-Assess and Owning Data Exfiltration
Egress-Assess and Owning Data Exfiltration
 
XP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsXP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applications
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
Ever Present Persistence - Established Footholds Seen in the Wild
Ever Present Persistence - Established Footholds Seen in the WildEver Present Persistence - Established Footholds Seen in the Wild
Ever Present Persistence - Established Footholds Seen in the Wild
 
DevOops & How I hacked you DevopsDays DC June 2015
DevOops & How I hacked you DevopsDays DC June 2015DevOops & How I hacked you DevopsDays DC June 2015
DevOops & How I hacked you DevopsDays DC June 2015
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 

Recently uploaded

Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...jicagig173
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's goSocioCosmos
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenSapana Sha
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comSagar Sinha
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...baharayali
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170Komal Khan
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfAlexander Sirach
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一ra6e69ou
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyAJHSSR Journal
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosSocioCosmos
 
fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project17mos052
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...makika9823
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...SejarahLokal
 

Recently uploaded (20)

Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go
 
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In  Vinod Nagarlooking for escort 9953056974 Low Rate Call Girls In  Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking Men
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
 
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary Study
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio Cosmos
 
fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...
 

Course_Presentation cyber --------------.pptx

  • 1. Web Application Penetration Testing Ebrahim Hegazy – Www.Security4Arabs.com
  • 2. About Myself ● Ebrahim Hegazy (@Zigoo0) ● 2009 → Junior Linux System Administrator ● 2011 → Security Engineer ● 2013 → Cyber Security Analyst (ThreatIntel) ● 2014 → Cyber Security Consultant (Pentesting) ● 2015 → Sr. Systems Security Engineer ● 2017 → Sr. Cyber Security Consultant ● Bug Bounty Hunter since 2013 (Yahoo, Google, Telekom.de, Avira, Paypal, Barracuda, Facebook, Twitter ….. And more.) ● Speaker for multiple international security conferences
  • 3. Course Target? ● ‫مشاركة‬ ‫العلم‬ ● ‫إثراء‬ ‫المحتوي‬ ‫العربي‬ ‫في‬ ‫هذا‬ ‫المجال‬ ● ‫التركيز‬ ‫علي‬ ‫التطبيق‬ ‫العملي‬ ‫في‬ ‫جميع‬ ‫الدروس‬ ● ‫إعطاء‬ ‫الفرصة‬ ‫للجميع‬ ‫من‬ ‫خالل‬ ‫مجانية‬ ‫الكورس‬ ● ‫كسر‬ ‫الخوف‬ ‫من‬ ‫المصطلحات‬ ‫المعقدة‬ ● ‫تنمية‬ ‫مهارات‬ ‫المتدربين‬ ‫بشرح‬ ‫أساسيات‬ ‫أكثر‬ ‫من‬ ‫مجال‬ ● ‫صدقة‬ ‫جارية‬ ‫لي‬ ‫ولوالدي‬ ‫رحمه‬ ‫هللا‬
  • 4. Course Agenda 1) Downloading & Installing Course Requirements 2) Linux Basics 3) BurpSuite and how to use it 4) Introduction Topics 5) Web Applications Vulnerabilities (Easy Level) 6) Web Applications Vulnerabilities (Medium Level) 7) Advanced Web Applications Vulnerabilities
  • 5. ● Course Requirements ● Installing necessarily browser plugins (Wappalyzer, FlagFox, FoxyProxy, SEO Status PageRank/Alexa Toolbar, Tamper data) ● Virtualbox ● Ubuntu & Windows ● Java & Burp Suite
  • 6. First Session ● Deep dive into data leaks (Haveibeenpwned.com & Shodan.io) ● ‫سنقوم‬ ‫في‬ ‫هذا‬ ‫الدرس‬ ‫بشرح‬ ‫كيف‬ ‫تمت‬ ‫عمليات‬ ‫اإلختراق‬ ‫علي‬ ‫المواقع‬ ‫العمالقه‬ ‫وكيف‬ ‫تم‬ ‫تسريب‬ ‫مليارات‬ ‫من‬ ‫الحسابات‬ ‫اإللكترونية‬ ‫في‬ ‫الفترة‬ ‫األخيرة‬ ● https://hacked-emails.com/api?q=$Email$
  • 7. Part (1) - Linux Basics ● Introduction to Linux. ● Packages & installation process ● Command line examples ● (man, apt-get, apt-cache, find, curl, wget, touch, >, >>, |, ;, head, tail, grep, cut, sort, nano, &, ps, df, top, files permissions)
  • 8. Intro to Linux ● Open Source Technology ● Hackers Friendly ● Easy packages installation ● Lots of flavors ● Etc etc
  • 10. Your Today Task ● Your today task is to: − install LAMP stack − Create a file, allow access to that file to root user ONLY. − You learned how to list processes, can you list p sub- processes? − RHCE (http://muhammedessa.com/portfolio- item/rhel7-rhcsa-rhce/)
  • 11. Part (1) - Introduction Topics ● 1- OSI Model in a Nutshell (Life of a Packet) ● 2- Wireshark & NetworkMiner ● 3- TCP/UDP/HTTP/HTTPS Protocols ● 3- Nmap basics ● 4- HTTP Methods & HTTP Response Types ● 5- HTTP Headers ● 6- Web Authentication Methods, Cookies, Sessions ● 7- Encryption, Encoding, Hashing
  • 12. ● Encryption, Encoding, Hashing ● Hashing: irreversible mathematical function that converts user input into a fixed size output. (used for Integrity checks) ● Encryption: converting human readable data/message into cipher-text, so only a person holding the right KEY can decrypt the message. (used for security purposes, authentication and authorization) ● Encoding: The purpose of encoding is to transform data so that it can be properly (and
  • 13. Hashing ● Irreversible (One way function) ● Fixed output size ● Examples: md4, md5, sha1, sha2 etc ● Demo time.
  • 14. Encoding ● The purpose of encoding is to transform data so that it can be properly (and safely) consumed by a different type of system. ● Example: base64, rot13, Hex, URL, etc etc ● Demo Time!
  • 15. Encryption ● Symmetric: uses the same key to encrypt and decrypt. ● Examples: AES, DES, 3DES, TwoFish, BlowFish ● Asymmetric: uses public key for encryption and private key for decryption. ● Examples: RSA, DH, DSA, ECDH etc ● Demo Time! :D
  • 17. Encryption Demo ● Caesar Cipher (Symmetric) ● RSA (Asymmetric) ● Certificate Chain ● Browser trusted CA’s ● Generate your own public & private keys.
  • 18. Task ● Your task for today is to watch this video: https://www.youtube.com/watch?v=eun8LJQ7YZs ● What is OCSP? Why we need it? ● What is root, Intermediate Certificate? ● CISSP All in one exam guide (7)
  • 19. OSI Model ● What happens when I open https://www.google.com/ in my browser? ● OSI Model ● How HTTPS Works?
  • 20.
  • 21.
  • 22. TCP vs UDP ● Every packet has: ● Source IP, Source Port, Destination IP, Destination Port. ● TCP ● How it works? Example attack? What is it used for? Example protocols? ● UDP ● How it works? Example attack? What is it used for? Example protocols?
  • 23.
  • 24. TCP 3 way Handshake demo ● Wireshark Demo of how TCP 3 way handshake works.
  • 25. What is DNS and how it works? ● Domain Name System ● How it works? ● Known attacks ● Different Record Types
  • 26. ● Known attacks ● DNS Poisoning ● Subdomain Takeover ● DNS Cache Snooping ● DNS Amplification Attacks (DDOS)
  • 27. ● Different Record Types ● A ● AAAA ● MX ● CNAME (Alias → Subdomain Takeover) ● PTR ● Tools: dig, nslookup, mxtoolbox.com
  • 28. Nmap ● What is Nmap and why we need it? ● Nmap basics ● Advance Nmap
  • 29. BurpSuite ● What is Burp and why we need it? ● A Journey into Burp Tabs ● Burp configuration ● Get your hands dirty using burp ● Burp Documentation: https://portswigger.net/burp/help/contents.html
  • 30. BurpSuite ● What is Burp and why we need it?
  • 31. HTTP Methods, Headers and status codes ● HTTP Protocol ● HTTP Methods (GET, POST, DELETE, OPTIONS, HEAD ….) ● HTTP Request Headers ● HTTP Response Headers ● HTTP Status Codes ● Tasks
  • 32. Tasks ● What is the difference between Cookies and Session ● What is 307 status code? ● What is WebDav?
  • 33. PHP GET vs POST ● Writing your first GET and POST request (http://www.security4arabs.com/2015/04/03/ho w-to-start-in-webapps-security/) ● Handling user input ● Filtering user input ● XSS into demo ● Client Side vs Server side
  • 34. XSS (Cross Site Scripting) ● Reflected XSS ● Stored XSS ● Dom based XSS ● Demo Time − Google XSS Game − Testphp.vulnweb.com
  • 35. How to Mitigate XSS ● Response Headers ● Filter User input ● Restrict user input ● Client Side vs Server Side.
  • 36. SOP, CORS, CSP ● Same origin policy requires the source Host to be the same protocol, same hostname and same port in order to read responses from other hostname. Every browser plugin has its own SOP (Flash, Java, Silverlight) ● Cross Origin Resource Sharing is a response header that allows cross origin requests. ● Content Security Policy controls which hostname is able to execute javascript, fonts, css and/or images on the target server.
  • 37. Advanced XSS ● Using XSS an attacker can steal user cookies, modify the page content, inject extra headers and more. ● Demo: http://185.45.192.228/stealer-xss/js.js − js.js → the java script code that will steal the user cookies − Demo.php → PHP code to store user cookies and other user information − Logs.txt → user data/cookies will be stored here.
  • 38. XSSI ● Cross Site Scripting Inclusion occurs when a dynamically generated javascript files holds users confidential information. ● JavaScript files doesn’t respect the SOP.
  • 39. Solving XSS challenges. ● Before we start, what are: − URL vs URI, Hostname, Domain Name, TLD, Subdomain, Backend, Frontend, and Endpoint. − Client Side & Server Side. ● Challenges: http://185.45.192.228/xssChall/ − Locating XSS payloads, html5sec.org and so on. − On* event handlers − Testing “ > < with Burp Intruder. − Rapid testing of XSS payloads − String encoding: https://mothereff.in/html-entities
  • 40. CSRF – Cross-site request forgery ● What is CSRF? Example? ● DEMO ● Auto form submit ● CSRF vs SOP ● CSRF Tokens and extra headers ● Live demo on Twitter ● Mitigation Techniques
  • 41. Lets earn some money! ● Bug bounty programs ● Bug bounty platforms: − Hackerone, Bugcrowd, SynAck − Vulbox, zerocopter, hackenproof.com ● Other BBP (Google, Facebook, Telekom.de)
  • 42. Lets earn some money! ● How to get started with Hackerone − Register − Find a nice target and read the policy − Start to hunt! − Private programs vs Public programs. ● How to write a nice report? CVSS? Markdown? ● Following up on reports? Any updates?
  • 43. Following up on reports
  • 44. Lets earn some money! ● Got a bounty, now what? ● Tax forms?
  • 45. Information disclosure ● Backup files (zip,tar,tgz,sql,rar,tar.gz…) ● Hidden files (.FileName) ● Source code repositories (.git, .svn) ● Source code files (.old,.bak,.php~,.swp) ● JavaScript files ● Github repositories (search github)
  • 46. Information disclosure ● https://hackerone.com/reports/396467 ● Tool to clone git repos to search it locally ● Dirsearch tool / Dirbuster ● Extending dirsearch list (Bo0om) ● Git / SVN extractor ● All files are on Github repo @zigoo0