The Art of Exploiting Injection Flaws

Notsosecure ltd | August 2-3


On This Page


Overview

OWASP rates injection flaws as the most critical vulnerability within the Top 10 most Critical Web Application Security Risks under the OWASP Top 10 project. https://www.owasp.org/index.php/Top_10_2013-A1-Injection

This hands-on session will only focus on the injection flaws and the attendees will get an in-depth understanding of the flaws arising from this vulnerability. The topics covered in the class are:

• SQL Injection
• XPATH Injection
• LDAP Injection
• Hibernate Query Language Injection
• Direct OS Code Injection
• XML Entity Injection

During the two-days course, the attendees will have access to a number of challenges for each flaw and they will learn a variety of exploitation techniques used by the attackers in the wild. Identify, extract, escalate, execute; we have got it all covered. The following are the objectives of the course:

• Understand the problem of Injection Flaws
• Learn a variety of advanced exploitation techniques which hackers use
• Learn how to fix these problems

Listen to Sid's podcast about the course here: http://traffic.libsyn.com/pauldotcom/PaulDotCom-329-Part2.mp3

All attendees will receive FREE 1 month access to on-line labs (http://www.securitytube-training.com/virtual-labs/sql-injection-labs/index.html) related to the class.

Outline

Day 1

SQL Injection



Day 2


Who Should Take This Course

• Web Application Developers
• Web Application Security Consultants
• Penetration Testers
• Anyone who wants to take their skills to next level


Student Requirements

Students must bring their own laptop with Windows Operating System installed (either natively or running in a VM). Further, students must have administrative access to perform tasks like install software, disable antivirus etc. Devices which don't have ethernet connection (e.g. MacBook Air, tablets, etc.) are not supported. A prior knowledge of Database systems and SQL language will be an added advantage but it's not a strict requirement.


What Students Should Bring

Same as above.


What Students Will Be Provided With

• Student hand-outs
• Tools/scripts (some public and some not so public)


Trainers

Sumit "sid" Siddharth is the founder of Notsosecure Ltd, a specialist IT security firm delivering high-end IT security consultancy and Training. Prior to Notsosecure, he worked as Head of Penetration Testing for a leading IT security company in UK. He has more than 9 years of experience in Penetration Testing. Sid has authored a number of whitepapers and tools. He has been a Speaker/Trainer at many security conferences including numerous Black Hat, DEF CON, OWASP Appsec, HITB etc. Sid is also a co-author of the book SQL Injection: Attacks and Defence (2nd edition).

Over the years, Sid has identified several critical flaws in leading software and helped fix these bugs. These include products from Microsoft, Oracle, Intel, Wordpress etc. He has trained several security consultants/penetration testers and helped them get better at their jobs. Sid was also a member of CREST assessor panel where he was responsible for setting the CREST examinations and examining candidates. Sid also holds both CREST certifications (Application and Infrastructure).