OSWE OffSec Web Expert - Advanced Web Attacks & Exploitation (WEB-300)
Summary
Advanced Web Attacks and exploitation (WEB-300) is an advanced web application security course that teaches the skills needed to conduct white box web app penetration tests. Learners who complete the course and pass the exam earn the OffSec Web Expert (OSWE) certification and will demonstrate mastery in exploiting front-facing web apps.
The OSWE is one of three certifications making up the OSCE3 certification along with the OSEP for advanced pentesting and OSED for exploit development.
Detailed Description
Offensive Security is giving you more for the same price in the Advanced Web Attacks and Exploitation (AWAE) course update. We’ve added 50% more content with new modules, custom private machines, and practice labs to give your team an even deeper understanding of web application security practices.
This challenging certification program will develop their skills in a white box and black box environment, with insight and instruction from top cybersecurity leaders. Students who complete the course and pass the exam earn the Offensive Security Web Expert (OSWE) certification, demonstrating mastery in exploiting front-facing web apps.
With AWAE you can trust that your company's data, reputation, and financial stability are as secure as possible, because your employees are well-prepared to take on the latest challenges
Benefits
- Performing advanced web app source code auditing
- Analyzing code, writing scripts, and exploiting web vulnerabilities
- Implementing multi-step, chained attacks using multiple vulnerabilities
- Using creative and lateral thinking to determine innovative ways of exploiting web vulnerabilities
Agenda / Topics to be Covered
The course covers the following topics. View the full syllabus: https://www.offsec.com/documentation/awae-syllabus.pdf
Cross-Origin Resource Sharing (CORS) with CSRF and RCE
- JavaScript Prototype Pollution
- Advanced Server-Side Request Forgery (SSRF)
- Web security tools and methodologies
- Source code analysis
- Persistent cross-site scripting
- Session hijacking
- .NET deserialization
- Remote code execution
- Blind SQL injection
- Data exfiltration
- Bypassing file upload restrictions and file extension filters
- PHP-type juggling with loose comparisons
- PostgreSQL Extension and User-Defined Functions
- Bypassing REGEX restrictions
- Magic hashes
- Bypassing character restrictions
- UDF reverse shells
- PostgreSQL large objects
- DOM-based cross-site scripting (black box)
- Server-side template injection
- Weak random token generation
- XML external entity injection
- RCE via database functions
- OS command injection via WebSockets (black box)
Target audience / Who should take this course
- Experienced penetration testers who want to better understand white box web app pen-testing
- Web application security specialists
- Web professionals working with the codebase and security infrastructure of a web application
Student requirements [knowledge pre-requisites]:
- Comfort reading and writing at least one coding language
- Familiarity with Linux
- Ability to write simple Python / Perl / PHP / Bash scripts
- Experience with web proxies
- General understanding of web app attack vectors, theory, and practice
What students should bring with them to the class:
- Laptop
What students will be provided with onsite:
- Wi-Fi Internet
About the Exam
- The WEB-300 web application security course and online lab prepare you for the OSWE certification
- 48-hour exam
- Proctored