Skip to content

Latest commit

 

History

History
41 lines (23 loc) · 5.09 KB

File metadata and controls

41 lines (23 loc) · 5.09 KB
description

PortSwigger - Web Security Academy

@PortSwigger Ltd

Web Security Academy

The Web Security Academy is a free online training center for web application security. It includes content from PortSwigger's in-house research team, experienced academics, encouraging theoretical and practical study with truly effective laboratories.

Install & Configure Burp Suite

Quick Method

In my case I installed Burp Suite Community Edition and Chromium on my main machine (Debian OS), by starting BurpSuite and clicking on Proxy -> Intercept -> Open Browser (orange button) it is possible to have Chromium already set for use and communicating directly with Burp.


Learning Paths

As suggested into HexDump BSCP Technical Guide there's not the methodology and the order of you path is subjective, you can use the existing learning paths, proceed with individual modules, do all the lab apprentice first etc, below is the table relating to a possible personalized study path: https://blog.leonardotamiano.xyz/tech/bscp-technical-guide/

https://portswigger.net/web-security/learning-paths

MODULETYPECOMPLEXITYSTATUS
1Informatin DisclosureServer-SideLowtrue
2Essential SkillsAdvancedLowtrue
3SQL InjectionServer-SideLowfalse
4Command InjectionServer-SideLowfalse
5Path TraversalServer-SideLowfalse
6XXE InjectionServer-SideLowfalse
7File Upload VulnerabilitiesServer-SideLowfalse
8Server-Side Request Forgery (SSRF)Server-SideLowfalse
9AuthenticationServer-SideLowfalse
10Access ControlServer-SideLowfalse
11ClickjackingClient-SideLowfalse
12Web LLM attacksAdvancedLowfalse
13Cross-site scripting (XSS)Client-SideMediumfalse
14Cross-site request forgery (CSRF)Client-SideMediumfalse
15Cross-origin resource sharing (CORS)Client-SideMediumfalse
16DOM-based vulnerabilitiesClient-SideMediumfalse
17Server-Side Template InjectionAdvancedMediumfalse
18Business Logic VulnerabilitiesServer-SideMediumfalse
19HTTP Host Header AttacksAdvancedMediumfalse
20Prototype PollutionAdvancedMediumfalse
21WebSocketsClient-SideMediumfalse
22JWT attacksAdvancedMediumtrue
23GraphQL API VulnerabilitiesAdvancedMediumfalse
24Insecure DeserializationAdvancedMediumfalse
25OAuth AuthenticationAdvancedHighfalse
26Race ConditionsServer-SideHighfalse
27HTTP Request SmugglingAdvancedHighfalse
28Web Cache PoisoningAdvancedHighfalse
29Web Cache DeceptionServer-SideHighfalse

Personally, i'm using a mixed approach.