Professional Documents
Culture Documents
0.1.1.1.1
1 Introduction
Modern web applications present an attack surface that has unquestionably continued to grow in
importance over the last decade. With the security improvements in network edge devices and
the reduction of successful attacks against them, web applications, along with social engineering,
arguably represent the most viable way of breaching the network security perimeter.
The desire to provide end-users with an ever-increasingly rich web experience has resulted in the
birth of various technologies and development frameworks that are often layered on top of each
other. Although these designs achieve their functional goals, they also introduce complexities into
web applications that can lead to vulnerabilities with high impact.
In this course, we will focus on the exploitation of chained web application vulnerabilities of
various classes, which lead to a compromise of the underlying host operating system. As a part
of the exploit development process, we will also dig deep into the methodologies and techniques
used to analyze the target web applications. This will give us a complete understanding of the
underlying flaws that we are going to exploit.
Ultimately, the goal of this course is to expose you to a general and repeatable approach to web
application vulnerability discovery and exploitation, while continuing to strengthen the
foundational knowledge that is necessary when faced with modern-day web applications.
1.1.1.1.1
1
(Offensive Security, 2021), https://forums.offensive-security.com/
primarily assist with technical issues; however, they may also clear up any doubts you may have
regarding the course material or the corresponding course exercises. Moreover, they may
occasionally provide with you a nudge or two if you happen to be truly stuck on a given exercise,
provided you have already given it your best try. The more detail you provide in terms of things
you have already tried and the outcome, the better.
2
(Offensive Security, 2021), https://help.offensive-security.com/
3
(Offensive Security, 2021), https://help.offensive-security.com/
read modules a number of times prior to fully understanding what is being taught. Remember, it
is a marathon, not a sprint, so take all the time you need.
As part of most course modules, there will be course exercises for you to complete. We
recommend that you fully complete them prior to moving on to the next module. These will test
your understanding of the material to ensure you are ready to move forward and will help you
preparing for the OSWE exam. The extra miles exercises are optional but we encourage students
to “play” with them especially if they have the intention of attempting the certification challenge.
The time it takes to complete these exercises depends on your background.
Note that IPs and certain code snippets shown in the book module and videos will not match your
environment. We strongly recommend you try to recreate all example scenarios from scratch,
rather than copying code from the book modules or videos. In all modules we will challenge you
to think in different ways, and rise to the challenges presented.
In addition to the course modules, the lab also contains three standalone lab machines running
custom web applications. These applications contain multiple vulnerabilities based on the
material covered in the course modules. You will need to apply the lessons learned in this course
to tackle these additional machines on your own.
A heavy focus of the course is on whitebox application security research, so that you can create
exploits for vulnerabilities in widely deployed appliances and technologies. Eventually, each
security professional develops his or her own methodology, usually based on specific technical
strengths. The methodologies suggested in this course are only suggestions. We encourage you
to develop your own methodology for approaching web application security testing as you
progress through the course.