Table of Contents
- Overview of Web and Related Technologies and Understanding the Application
- Web Penetration Testing- Through Code Review
- Web Penetration Testing-Injection Attacks
- Fuzzing, Dynamic scanning of REST API and Web Application
- Web Penetration Testing- Unvalidated Redirects/Forwards, SSRF
- Pentesting for Authentication, Authorization Bypass, and Business Logic Flaws
- Pentesting for Sensitive Data, Vulnerable Components, Security Monitoring
- Exploiting File Upload Functionality and XXE Attack
- Web Penetration Testing: Thick Client
- Introduction to Network Pentesting
- Introduction to Wireless Pentesting
- Penetration Testing-Mobile App
- Security Automation for Web Pentest
- Setting up Pentest Lab