Curriculum
- 10 Sections
- 10 Lessons
- 40 Hours
Expand all sectionsCollapse all sections
- Module 1: Web Application Fundamentals1
- Module 2: Web Reconnaissance & Mapping1
- Module 3: Authentication & Session Attacks1
- Module 4: Input Validation & Injection Attacks1
- Database EnumerationReflected, Stored & DOM-based XSS XSS exploitation scenarios Bypassing filters and WAFs Real-world impact & mitigation understanding1
- Module 6: Cross-Site Request Forgery (CSRF)1
- Directory TraversalServer-Side Request Forgery (SSRF) CORS misconfigurations File upload vulnerabilities Business logic flaws1
- XML External Entity (XXE) ProcessingManual testing techniques Intercepting and modifying traffic Fuzzing and payload crafting Understanding tool output vs real vulnerabilities1
- Server-Side Template Injection (SSTI)Writing professional penetration testing reports Risk rating and impact analysis Clear remediation recommendations Executive and technical reporting styles1
- Server-Side Request Forgery (SSRF)1
Explore how attackers manipulate XML processors to access files, execute commands, or perform denial-of-service attacks. Understand the mechanics of XXE attacks and the potential consequences. Learn to secure XML parsers and prevent XXE vulnerabilities in web applications.
Prev
Learn how attackers force a web application to make requests to internal or external systems, potentially leading to data exfiltration, service disruption, or access to internal resources. Understand the various SSRF attack vectors and implement countermeasures to prevent unauthorized requests.
Next

