• Online, Self-Paced
Course Description

Poorly implemented session management can allow an attacker to exploit poor controls and gain access to sensitive information. In Web Application Penetration Testing: Session Management Testing, you'll learn how to find those vulnerabilities before the bad guys do. First, you'll explore cookies, what to look for during a pen-test, and how you can brute force your way passed the login prompt. Next, you'll learn how easy it can be to hijack someone else's session with session fixation. Finally, you'll discover what session puzzling is and how to leverage it as an attacker. When you're finished with this course, you'll have a solid understanding of what to look for while penetration testing session management.

Learning Objectives

  • Testing for Bypassing Session Management Schema
  • Testing for Cookie Attributes
  • Testing for Session Fixation
  • Testing for Exposed Session Variables
  • Testing for Cross-site Request Forgery
  • Testing for Logout Functionality
  • Testing Session Timeout
  • Testing Session Puzzling

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Vulnerability Assessment and Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.