

* Project 7x: Protecting a Server with iptables and iptstate (10 pts.) (Updated 11-8-16)Ĭh 1b: Online Voting - Follow My Vote - 100% SecureĬh 1c: Android Apps Vulnerable to Code ModificationĬh 1e: CMS Vulnerabilities are DecreasingĬh 1f: Attention SinVR users | Continuous Cyber Security | UK | Digital Interruption (Jan 17, 2018)Ĭh 3d: Microsoft Edge Browser won't support ActiveX, VBScript, other Internet Explorer featuresĬh 3e: VBScript is no longer supported in IE11 edge mode (Windows)Ĭh 3i: Simple Google Maps API Example - JaywayĬh 4b: How To Burp - Slides from David BrownĬh 4c: Web Common Directories and Filenames - Word Lists CollectionĬh 4d: GitHub - spinkham/skipfish: Web application security scanner created by lcamtuf for google - Unofficial MirrorĬh 4h: httprecon project - advanced http fingerprintingĬh 4i: Electronic & Transactional Content Management | OpenText, VignetteĬh 4k: Web Application Fingerprint (OWASP-IG-004)Ĭh 4m: Using HTTP Methods (GET, POST, PUT, etc.) in Web APIĬh 4n: OWASP DirBuster - Replaced by Zed Attack ProxyĬh 5d: JAVA De-serialization: It can't get any simpler than this !!Ĭh 5e: WCF Binary Soap Plug-In forï¿❛urp (for Silverlight)Ĭh 5f: JAD Java Decompiler Download MirrorĬh 5i: WebInspect: Dynamic Analysis, DAST, Penetration Testing Tools | Hewlett Packard EnterpriseĬh 5j. Project 6x: Protecting SSH with Fail2Ban (15 pts.) Project 5x: Exploiting ECB Encryption (35 pts.) Project 4x: Encrypting Text in ECB and CBC Modes (15 pts.)
Sinvr bypass client checks windows#
Project 3x: DNSCrypt on Windows (15 pts.) Project 2x: SQL Injection Challenges (30 pts.) Project 1x: Command Injection Challenges (25 pts.) (ImageMagick Exploit Fixed 12-1-16) Project 13: Automating Web Requests with Python (15 pts.

Project 10: Exploiting ECB-Encrypted Tokens with Burp (15 pts.) Project 8: Defeating Client-Side Validation with Burp (15 pts.) * Project 7: Using Tripwire for Intrusion Detection (15 pts.) * Project 6: Making a Linux Virtual Machine (15 pts.) (rev. Project 5: Mapping an Application with Burp (15 pts.) Ĭh 13: Attacking Users: Other Techniques (Part 2 of 2).Ĭh 13: Attacking Users: Other Techniques (Part 1 of 2).Ĭh 12: Attacking Users: Cross-Site Scripting (Part 2 of 3).Ĭh 12: Attacking Users: Cross-Site Scripting (Part 1 of 3).Ĭh 9: Attacking Data Stores (Part 2 of 2).Project 10: Exploiting ECB-Encrypted Tokens with BurpĬh 9: Attacking Data Stores (Part 1 of 2)

Project 4x: Encrypting Text in ECB and CBC Modes Project 8: Defeating Client-Side Validation with Burp Project 7: Using Tripwire for Intrusion Detection Project 5: Mapping an Application with Burp

In this workshop, participants will perform attacks on Web applications, including command injection, ImageMagick exploitation, SQL injection, Cross-Site Request Forgery, Cross-Site Scripting, and basic and advanced cookie manipulations. "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd Edition", by Dafydd Stuttard, Marcus Pinto ISBN-10: 1118026470 Attacking and Defending Web Applications: Hands-On
