TECH TRAINING 1 – THE ART OF EXPLOITING INJECTION FLAWS
News Flash: The labs from this class are now being made available on-line and all attendees of this class will receive FREE access for 1 month to all on-line labs after the training
TRAINERS: Sumit Siddharth (Director, NotSoSecure Ltd) |
CAPACITY: 25 pax |
SEATS LEFT: 10
|
DURATION: 2 days (14th & 15th October 2013) |
COST (per pax): MYR4999 (early bird) / MYR5999 (non early-bird) |
________________
OVERVIEW
OWASP rates injection flaws as the most critical vulnerability within the Top 10 most Critical Web Application Security Risks under the OWASP Top 10 project. http://www.owasp.org/index.php/Top_10_2010-A1
This hands-on session will only focus on the injection flaws and the attendees will get an in-depth understanding of the flaws arising from this vulnerability. The topics covered in the class are:
-
SQL Injection
-
XPATH Injection
-
LDAP Injection
-
Hibernate Query Language Injection
-
Direct OS Code Injection
-
XML Entity Injection
During the 2 days course, the attendees will have access to a number of challenges for each flaw and they will learn a variety of exploitation techniques used by the attackers in the wild. Identify, extract, escalate, execute; we have got it all covered. The following are the objectives of the course:
LEARNING OBJECTIVES / FOCUS
-
Understand the problem of Injection Flaws
-
Learn a variety of advanced exploitation techniques which hackers use.
-
learn how to fix these problems?
WHO SHOULD ATTEND
Penetration Testers, Web Developers, Security Auditors/Administrators/Managers, anyone else who wants to take their skills to the next level.
COURSE AGENDA
DAY 1:
SQL Injection
-
Identifying SQL Injections
-
Exploiting SQL Injections
-
With Error Messages enabled
-
With Error Messages disabled
-
Blind Injection
-
Union Queries
-
Time delays
-
Out of Band Channels
-
Heavy Queries
-
Advanced Topics:
-
Injection in Order by, group by, limit, SQL name etc.
-
2nd Order SQL Injections
-
Exploiting Non Interactive SQL Injections
-
SQL injection vs prepared statements and bind parameters
-
Injection in stored procedures
-
Privilege Escalation (Becoming DBA and ‘SA’)
-
OS code execution under MS-SQL, Mysql and Oracle from web apps.
-
Obtaining and Cracking Database password hashes
-
Fixing SQL Injection
DAY 2:
-
Hibernate Query Language Injection
-
Advanced HQLi
-
Xpath Injection
-
Blind Injection
-
Automating XPATH Injection
-
XPATH 2.0 Injection
-
LDAP Injection
-
Blind Injection
-
Automating LDAP Injection
-
XML external Entity Injection
-
Reading arbitrary files
-
XML Tag Injection
PREREQUISITES
-
A prior knowledge of databases/SQL would be handy but is not a strict requirement.