Instructor

Porhai Eung

Porhai Eung is a Network Engineer and ICT security who enjoys both learning and sharing his knowledge with others. With over 7 years of experience in Internet Service Provider (ISP), Banking, Payment and Education industry, Porhai Eung has added many achievements to his name both national and international.

SalaCyber Web Hacking Essential (SWHE)

SWSE is for students who are interested in learning fundamental of web security and techniques to find and explore vulnerabilities and weakness in web applications. The course will cover from the basic of web development to OWASP

Duration: 45 Hours

Location: Online


Prerequisites

Web technologies, web development languages, and SEHE Completion (Recommend)


Syllabus

HTTP Basic and Essential Tools

  • Web Fundamental
  • API Fundamental
  • Encoding and Filtering
  • Web application assessment methodologies

 

Information Gathering

  • Overview of the web from a penetration tester's perspective
  • WHOIS and DNS reconnaissance
  • Interception Proxies
  • Proxying SSL through Burp Suite
  • Spider a website
  • Brute forcing unlinked files and directories
  • Web authentication mechanisms
  • Fuzzing with Burp Intruder
  • Burp sequencer

 

File Inclusion Vulnerability

  • Remote File Inclusion (RFI)
  • Local File Inclusion (LFI)
  • File Inclusion to Remote Management
  • How to see Vulnerability
  • How to exploit Vulnerability
  • Case Studies

 

Injection Vulnerability

  • SQL injection
  • Command Injection
  • How to see Vulnerability
  • How to exploit Vulnerability
  • Case Studies

 

Cross-Site Scripting (XSS)

  • Reflected XSS
  • Dom-based XSS
  • Stored XSS
  • How to see Vulnerability
  • How to exploit Vulnerability
  • Case Studies

 

Cross Side Request Forgery

  • Introduction
  • How to see Vulnerability
  • How to exploit Vulnerability
  • Case Studies

 

Rate Limiting Vulnerability

  • Introduction
  • Password Attack
  • OTP Attack
  • How to see Vulnerability
  • How to exploit Vulnerability
  • Case Studies

 

Access Control Vulnerability

  • Introduction
  • Insecure Direct Object Reference
  • How to see Vulnerability
  • How to exploit Vulnerability
  • Case Studies

Facebook Page

Keep your knowledge up-to-date

Follow our Facebook page and get update as well as valuable lesson from our team.


© , made with by SalaCyber Team