The WAPT Training is a online training program in the field of web application security. In this training program, you will learn how to perform a vulnerability assessment and penetration test on a live web application in a virtual lab environment. This training program is created team of experts. You will learn through video tutorials. For a great handson learning experience, this training program is packed with assignments, assessment tests, quizzes, and practice exercises. At the end of this training program, you will be hacking a live web application and generating an industry standard report.
Problem Statement: - Run your SQL command on a live website
Description: - SQL injection is the CRUD operation against a database of a website to affects its operations and give the attacker an opportunity to run their own SQL command against the database using the frontend of the website. Here we will understand how text box input is the best friend for a attacker.
Problem Statement: - Make a File and resource attack by changing resource identifiers.
Description: - With this kind of attack we change resource identifiers used by an application in order to perform a malicious task. As an application defines a resource type or location based on user input like file name or port number, this data can be manipulated to execute or access different resources. An application that permits input of special characters like period, slash, and backslash is risky when used in conjunction with methods that interact with the file system. Resource injection differs from path manipulation as it focuses on accessing resouces other than the local file system.
Problem Statement: - Path Traversal and Local File Inclusion vulnerability test on wordpress website.
Description: - WordPress is mostly used website building tool over internet with 35% of market share. Huge number of active installations all gives a massive attack surface. A regular attempt is made to hack into WordPress sites. On getting access to an account with at least author privileges on target WordPress site one can execute arbitrary PHP code on the underlying server and can get a full remote takeover. We will learn about both Path Traversal and Local File Inclusion vulnerability was automatically detections.
There is no such prerequisite if you are enrolling for Master’s Course as everything will start from scratch. Whether you are a working IT professional or a fresher you will find a course well planned and designed to incorporate trainee from various professional backgrounds.