Course Outline
Introduction
Exploring the OWASP Testing Project for Government
- Principles of Security Testing for Government
- Testing Techniques for Government Systems
- Deriving Security Test Requirements for Government Applications
- Integrating Security Tests into Development and Testing Workflows for Government Projects
- Security Test Data Analysis and Reporting for Government Audiences
Working with the OWASP Testing Framework for Government
- Phase 1: Before Development Begins for Government Systems
- Phase 2: During Definition and Design for Government Projects
- Phase 3: During Development for Government Applications
- Phase 4: During Deployment for Government Environments
- Phase 5: Maintenance and Operations for Government Systems
- A Typical Lifecycle Testing Workflow for Government
- Penetration Testing Methodologies for Government
Testing Web Application Security for Government
- Introduction and Objectives for Government-Specific Applications
- Information Gathering for Government Systems
- Conduct Search Engine Discovery and Reconnaissance for Information Leakage in Government Applications
- Fingerprint Web Server for Government Environments
- Review Webserver Metafiles for Information Leakage in Government Systems
- Enumerate Applications on Webserver for Government Projects
- Review Webpage Content for Information Leakage in Government Websites
- Identify Application Entry Points for Government Applications
- Map Execution Paths Through Application for Government Systems
- Fingerprint Web Application Framework for Government Use
- Fingerprint Web Application for Government Environments
- Map Application Architecture for Government Projects
- Configuration and Deployment Management Testing for Government Systems
- Test Network/Infrastructure Configuration for Government Networks
- Test Application Platform Configuration for Government Applications
- Test File Extensions Handling for Sensitive Information in Government Systems
- Review Old, Backup, and Unreferenced Files for Sensitive Information in Government Environments
- Enumerate Infrastructure and Application Admin Interfaces for Government Projects
- Test HTTP Methods for Government Applications
- Test HTTP Strict Transport Security for Government Websites
- Test RIA Cross Domain Policy for Government Systems
- Test File Permissions for Government Environments
- Test for Subdomain Takeover in Government Domains
- Test Cloud Storage for Government Applications
Identity Management Testing for Government
- Test Role Definitions for Government Systems
- Test User Registration Process for Government Applications
- Test Account Provisioning Process for Government Environments
- Testing for Account Enumeration and Guessable User Accounts in Government Systems
- Testing for Weak or Unenforced Username Policy in Government Applications
Authentication Testing for Government
- Testing for Credentials Transported Over an Encrypted Channel for Government Applications
- Testing for Default Credentials in Government Systems
- Testing for Weak Lockout Mechanism in Government Environments
- Testing for Bypassing Authentication Schema in Government Applications
- Testing for Vulnerable Remember Password Functionality in Government Systems
- Testing for Browser Cache Weaknesses in Government Websites
- Testing for Weak Password Policy in Government Environments
- Testing for Weak Security Question Answers in Government Applications
- Testing for Weak Password Change or Reset Functionalities in Government Systems
- Testing for Weaker Authentication in Alternative Channels for Government Projects
Authorization Testing for Government
- Testing Directory Traversal/File Include for Government Systems
- Testing for Bypassing Authorization Schema in Government Applications
- Testing for Privilege Escalation in Government Environments
- Testing for Insecure Direct Object References in Government Projects
Session Management Testing for Government
- Testing for Session Management Schema in Government Systems
- Testing for Cookies Attributes in Government Applications
- Testing for Session Fixation in Government Environments
- Testing for Exposed Session Variables in Government Projects
- Testing for Cross-Site Request Forgery (CSRF) in Government Websites
- Testing for Logout Functionality in Government Systems
- Testing Session Timeout in Government Applications
- Testing for Session Puzzling in Government Environments
- Testing for Session Hijacking in Government Projects
Input Validation Testing for Government
- Testing for Reflected Cross-Site Scripting (XSS) in Government Systems
- Testing for Stored Cross-Site Scripting (XSS) in Government Applications
- Testing for HTTP Verb Tampering in Government Environments
- Testing for HTTP Parameter Pollution in Government Projects
- Testing for SQL Injection in Government Databases
- Testing for Oracle in Government Systems
- Testing for MySQL in Government Applications
- Testing for SQL Server in Government Environments
- Testing for PostgreSQL in Government Projects
- Testing for MS Access in Government Systems
- Testing for NoSQL Injection in Government Applications
- Testing for ORM Injection in Government Environments
- Testing for Client-Side Validation in Government Projects
- Testing for LDAP Injection in Government Systems
- Testing for XML Injection in Government Applications
- Testing for SSI Injection in Government Environments
- Testing for XPath Injection in Government Projects
- Testing for IMAP/SMTP Injection in Government Systems
- Testing for Code Injection in Government Applications
- Testing for Local File Inclusion (LFI) in Government Environments
- Testing for Remote File Inclusion (RFI) in Government Projects
- Testing for Command Injection in Government Systems
- Testing for Format String Injection in Government Applications
- Testing for Incubated Vulnerabilities in Government Environments
- Testing for HTTP Splitting/Smuggling in Government Projects
- Testing for HTTP Incoming Requests in Government Systems
- Testing for Host Header Injection in Government Applications
- Testing for Server-Side Template Injection (SSTI) in Government Environments
- Testing for Server-Side Request Forgery (SSRF) in Government Projects
Testing for Error Handling for Government
- Testing for Improper Error Handling in Government Systems
- Testing for Stack Traces in Government Applications
Testing for Weak Cryptography for Government
- Testing for Weak Transport Layer Security (TLS) in Government Environments
- Testing for Padding Oracle Attacks in Government Projects
- Testing for Sensitive Information Sent via Unencrypted Channels in Government Systems
- Testing for Weak Encryption in Government Applications
Business Logic Testing for Government
- Introduction to Business Logic for Government-Specific Applications
- Test Business Logic Data Validation for Government Projects
- Test Ability to Forge Requests in Government Systems
- Test Integrity Checks in Government Environments
- Test for Process Timing in Government Applications
- Test Number of Times a Function Can Be Used Limits in Government Systems
- Testing for the Circumvention of Workflows in Government Projects
- Test Defenses Against Application Misuse in Government Environments
- Test Upload of Unexpected File Types in Government Applications
- Test Upload of Malicious Files in Government Systems
Client-Side Testing for Government
- Testing for DOM-Based Cross-Site Scripting (XSS) in Government Websites
- Testing for JavaScript Execution in Government Environments
- Testing for HTML Injection in Government Projects
- Testing for Client-Side URL Redirects in Government Systems
- Testing for CSS Injection in Government Applications
- Testing for Client-Side Resource Manipulation in Government Environments
- Testing Cross-Origin Resource Sharing (CORS) in Government Projects
- Testing for Cross-Site Flashing in Government Systems
- Testing for Clickjacking in Government Applications
- Testing WebSockets in Government Environments
- Testing Web Messaging in Government Projects
- Testing Browser Storage in Government Systems
- Testing for Cross-Site Script Inclusion (XSSI) in Government Applications
API Testing for Government
- Testing GraphQL for Government Applications
Reporting for Government
- Introduction to Reporting for Government Audiences
- Executive Summary for Government Stakeholders
- Findings for Government Systems
- Appendices for Government Documentation
Requirements
- A general understanding of the web development lifecycle for government
- Experience in web application development, security, and testing for government
Audience
- Developers
- Engineers
- Architects
Testimonials (7)
Complex approach to the topic in connection to the practical examples, all this together with the trainer's energy and his huge experience.
Ihor - Osrodek Przetwarzania Informacji - Panstwowy Instytut Badawczy
Course - Web Security with the OWASP Testing Framework
I found the entire OWASP course to be informative and well structured. If I had to pick one aspect that stood out the most, I'd say it was the coverage of web security vulnerabilities and the practical examples shown. The course helped me understand how to apply owasp concepts in various scenarios using different tools
Piotr - Osrodek Przetwarzania Informacji - Panstwowy Instytut Badawczy
Course - Web Security with the OWASP Testing Framework
* great live-demos * good pacing * good intro to security testing
Robert McClure - EUROPOL
Course - Web Security with the OWASP Testing Framework
the content and the knowledge of the trainer
Bogdan Birou - EUROPOL
Course - Web Security with the OWASP Testing Framework
Great and relevant examples, good speed, good excercises. Highly recommended!
Istvan Visegradi - EUROPOL
Course - Web Security with the OWASP Testing Framework
Very skilled and likable trainer. Interesting topics and real life examples.
Jon Lunde - Buypass AS
Course - Web Security with the OWASP Testing Framework
Demos and exercises