Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Applied Technology Academy
  4. OffSec - WEB-300: Advanced Web Attacks and Exploitation AWAE (OSWE)

OffSec - WEB-300: Advanced Web Attacks and Exploitation AWAE (OSWE)

In AWAE, you will be learning white box web app PenTest methods. The bulk of your time will be spent analyzing source code, decompiling Java, debugging DLLs, manipulating requests, and more, using tools like Burp Suite, dnSpy, JD-GUI, Visual Studio, and the trusty text editor. The course covers the following topics in detail. For a more complete breakdown of the course topics, please refer to the AWAE syllabus.

  • Web security tools and methodologies
  • Source code analysis
  • Persistent cross-site scripting
  • Session hijacking
  • .NET deserialization
  • Remote code execution
  • Blind SQL injections
  • Data exfiltration
  • Bypassing file upload restrictions and file extension filters
  • PHP type juggling with loose comparisons
  • PostgreSQL Extension and User Defined Functions
  • Bypassing REGEX restrictions
  • Magic hashes
  • Blind SQL injection
  • Bypassing character restrictions
  • UDF reverse shells
  • PostgreSQL large objects
  • DOM-based cross site scripting (black box)
  • Server side template injection
  • Weak random token generation
  • XML external entity injection
  • RCE via database functions
  • OS command injection via WebSockets (black box)

Provider Information

More courses from this provider:
Contact Information

1992 Lewis Turner Blvd, Suite 131
Fort Walton Beach, FL 32547

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
WEB-300
Course Prerequisites

Advanced Web Attacks and Exploitation expects students have the following before starting the course:

  • Comfort reading and writing at least one coding language (Java, .NET, JavaScript, Python, etc.)
  • Familiarity with Linux: file permissions, navigation, editing, and running scripts
  • Ability to write simple Python / Perl / PHP / Bash scripts
  • Experience with web proxies, such as Burp Suite and similar tools
  • General understanding of web app attack vectors, theory, and practice
Training Purpose
Functional Development
Skill Development
Specific Audience
All
Federal Employee
General Public
Delivery Method
Classroom
Online, Instructor-Led
Online, Self-Paced
Course Locations

Fort Walton Beach, FL 32547

Tampa, FL 33602

Tampa, FL 33605

Panama City, FL 32401

Las Vegas, NV 89101

Montgomery, AL 36104

San Antonio, TX 78225

Warner Robins, GA 31098

Augusta, GA 30907

Farmington, UT 84025

Columbia, MD 21046

Herndon, VA 20170

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Classroom
  • Online, Instructor-Led
  • Online, Self-Paced

Learning Objectives

  • Performing advanced web app source code auditing
  • Analyzing code, writing scripts, and exploiting web vulnerabilities
  • Implementing multi-step, chained attacks using multiple vulnerabilities
  • Using creative and lateral thinking to determine innovative ways of exploiting web vulnerabilities

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: