Curriculum
- 18 Sections
- 104 Lessons
- 45 Hours
Expand all sectionsCollapse all sections
- 1. Introduction to the VAPT5
- 1.1SDLC (Software Development Life Cycle) – Phases & SSDLC (Secure Software Development Life Cycle)
- 1.2Types of Testing & types of hackers
- 1.3Cybersecurity, PT (Penetration Testing) – Types & Phases
- 1.4CIA Triad & USF (Unified Security Framework) Client-Server Communication
- 1.5Overview and basics of VAPT (Vulnerability Assessment and Penetration Testing)
- Security standards and methodologies3
- Critical aspects of analyzing application flow and functionality3
- Key web application technologies and concepts:10
- 4.1Http Request methods & Response codes
- 4.2Http General headers & Security Headers
- 4.32 tier & 3- tier Architecture
- 4.4Difference Between Encoding, Encryption, and Hashing
- 4.5HTTP Proxy and different types of proxies
- 4.6Encoding schemes (URL, unicode, base64, Hex etc)
- 4.7Web Spidering
- 4.8Hidden parameters, Discovering hidden content
- 4.9Identifying client and server side technologies
- 4.10Identifying entry points for user
- Input Authentication Testing:14
- 5.1About Authentication Process Cycle
- 5.2Understanding different login patterns
- 5.3Introduction of Burp Suite
- 5.4Authentication Bypass using SQL payloads
- 5.5Login Brute force
- 5.6User Enumeration and Hard Coded Credentials
- 5.7Insecure Logout Implementation
- 5.8Strict Transport Security Not Enforced
- 5.9Testing OTP Length, Duration & Rate Limitation
- 5.10Mobile/Email OTP Bombing
- 5.11Leakage of OTP in Later Response
- 5.12Response Tampering OTP Bypass
- 5.13Testing IDOR – Token Based Authentication
- 5.14Sending User Credentials using GET method
- Testing the User Registration Process5
- Testing Password Reset Functionality5
- Sensitive Data Exposure6
- 8.1About Sensitive Data Exposure depending on Application Category
- 8.2Insecure Error Handling
- 8.3Information disclosure via metadata
- 8.4Insecure communication channel
- 8.5Hidden/sensitive directories & files in robots.txt
- 8.6Return of sensitive information in later responses (example: password, otp, other user’s private/sensitive information)
- API Communication4
- Testing for Cookie Attacks6
- Headers & Policy Scrutiny5
- Session Management Issues3
- Testing for Authorization testing5
- Data Validation Testing3
- Injection attacks and Testing for Server Side Issues5
- Business Logic Issues14
- 16.1About different payment methods Integration
- 16.2About Payment Tampering Method
- 16.3Straight Forward Payment Tampering
- 16.4Add-on Based Payment Tampering
- 16.5Coupon Based Payment Tampering
- 16.6Longitude and Latitude based payment tampering (In Case of CAB booking, if validation process depends on Long & Lat)
- 16.7Failure to Success Journey
- 16.8HTTP Parameter pollution (In case of Amount parameter)
- 16.9Getting High Benefits Features with Low Benefit cost (In case of Feature id)
- 16.10Test with Fake DC/CC with CVV
- 16.11Sensitive information Leakage
- 16.12Insecure Direct Object Reference (Getting Booking & Billing Details, in case of E-Comers application)
- 16.13Testing IDOR (In case QR Code generated based on ID value)
- 16.14Bypassing Attaching Mandatory Entities
- Testing for Security Misconfiguration3
- Miscellaneous and Other Vulnerabilities5
Pixel Flood Attack
Prev