Curriculum
- 18 Sections
- 104 Lessons
- 45 Hours
Expand all sectionsCollapse all sections
- 1. Introduction to the VAPT5
- 1.0SDLC (Software Development Life Cycle) – Phases & SSDLC (Secure Software Development Life Cycle)
- 1.1Types of Testing & types of hackers
- 1.2Cybersecurity, PT (Penetration Testing) – Types & Phases
- 1.3CIA Triad & USF (Unified Security Framework) Client-Server Communication
- 1.4Overview and basics of VAPT (Vulnerability Assessment and Penetration Testing)
- Security standards and methodologies3
- Critical aspects of analyzing application flow and functionality3
- Key web application technologies and concepts:10
- 4.0Http Request methods & Response codes
- 4.1Http General headers & Security Headers
- 4.22 tier & 3- tier Architecture
- 4.3Difference Between Encoding, Encryption, and Hashing
- 4.4HTTP Proxy and different types of proxies
- 4.5Encoding schemes (URL, unicode, base64, Hex etc)
- 4.6Web Spidering
- 4.7Hidden parameters, Discovering hidden content
- 4.8Identifying client and server side technologies
- 4.9Identifying entry points for user
- Input Authentication Testing:14
- 5.0About Authentication Process Cycle
- 5.1Understanding different login patterns
- 5.2Introduction of Burp Suite
- 5.3Authentication Bypass using SQL payloads
- 5.4Login Brute force
- 5.5User Enumeration and Hard Coded Credentials
- 5.6Insecure Logout Implementation
- 5.7Strict Transport Security Not Enforced
- 5.8Testing OTP Length, Duration & Rate Limitation
- 5.9Mobile/Email OTP Bombing
- 5.10Leakage of OTP in Later Response
- 5.11Response Tampering OTP Bypass
- 5.12Testing IDOR – Token Based Authentication
- 5.13Sending User Credentials using GET method
- Testing the User Registration Process5
- Testing Password Reset Functionality5
- Sensitive Data Exposure6
- 8.0About Sensitive Data Exposure depending on Application Category
- 8.1Insecure Error Handling
- 8.2Information disclosure via metadata
- 8.3Insecure communication channel
- 8.4Hidden/sensitive directories & files in robots.txt
- 8.5Return of sensitive information in later responses (example: password, otp, other user’s private/sensitive information)
- API Communication4
- Testing for Cookie Attacks6
- Headers & Policy Scrutiny5
- Session Management Issues3
- Testing for Authorization testing5
- Data Validation Testing3
- Injection attacks and Testing for Server Side Issues5
- Business Logic Issues14
- 16.0About different payment methods Integration
- 16.1About Payment Tampering Method
- 16.2Straight Forward Payment Tampering
- 16.3Add-on Based Payment Tampering
- 16.4Coupon Based Payment Tampering
- 16.5Longitude and Latitude based payment tampering (In Case of CAB booking, if validation process depends on Long & Lat)
- 16.6Failure to Success Journey
- 16.7HTTP Parameter pollution (In case of Amount parameter)
- 16.8Getting High Benefits Features with Low Benefit cost (In case of Feature id)
- 16.9Test with Fake DC/CC with CVV
- 16.10Sensitive information Leakage
- 16.11Insecure Direct Object Reference (Getting Booking & Billing Details, in case of E-Comers application)
- 16.12Testing IDOR (In case QR Code generated based on ID value)
- 16.13Bypassing Attaching Mandatory Entities
- Testing for Security Misconfiguration3
- Miscellaneous and Other Vulnerabilities5