Course AbstractThe Bug Hunter's Methodology is a comprehensive two day training on offensive web security testing. It is primarily focused for web application security testers and bug bounty hunters. TBHM focuses on the newest tools and techniques for web application testers. The class goes over such topics as:
- Advents in web recon
- Prioritizing target testing areas by technology and features
- Crash course on Burp Suite
- Blind XSS
- Server-side template injection
- Server-side request forgery
- Code injection (SQLi, PHP, ++)
- XXE
- Robbing misconfigured infrastructure (AWS)
- git pillaging
- Github robbing
- CI/Code repositories exploitation
- Subdomain takeover
- and more!
Training SyllabusDay 1:
Emergent web recon (Large Module, LIVE labs)
- IP enumeration (ASNs and Cloud)
- Brand Enumeration (Acquisitions, RevWHOIS, Reverse tracker Analysis)
- Subdomain Enumeration (Scraping and Bruteforcing)
- Effective Port Scanning
- Version based vulnerability analysis
- Directory Bruteforcing / Content Discovery best practices
- Prioritizing target testing areas by technology and features
Crash course on Burp Suite
- Burp Setup and helpers
- Burp proxy and scope
- Burp Intruder
- Burp Repeater and configuration setting
- Getting to know Burp through use-cases: LABS
Blind XSS
- An introduction to BXSS
- Available BXXS frameworks
- LABS
Server-side template injection
- An introduction to SSTI
- SSTI Identification
- SSTI Tooling
- SSTI LABS
Day 2:
Server-side request forgery
- An introduction to SSRF
- SSRF Identification
- SSRF Tooling
- SSRF LABS
Code injection (SQLi, ++)
- Common (still available today) types of code injection
- SQLmap crash course
- SQLi common areas
- LABS
XML External Entity Injection
- An introduction to XXE
- XXE Identification
- XXE Tooling / payloads
- XXE LABS
Access Control Testing
- The ever-giving IDOR and MFLAC
- Examples
- LABS
Robbing misconfigured infrastructure
- introduction to AWS s3 Permissions
-- Labs
- git pillaging
-- Labs
- Github robbing
-- Live exercise
- CI/Code repositories exploitation (no lab)
- Subdomain takeover
-- Labs
Upon Completion of this training, attendees will know:At the end of this course, students should have some solid fundamentals in web testing for vulnerabilities that are more likely to show up in the wild TODAY. Not only does the course aim to arm the student with the technique, tools, and labs, but also a contextual and data-driven methodology on where and how to look for each vulnerability.
Attendees should bring:Laptop, Burp Suite (PRO preferably), VM or equivalent access to *nix command line.
Pre-requisites for attendees:General Web application security testing knowledge required.
Some topics will assume some knowledge of OWASP Top Ten type vulnerabilities.