TST 901: Advanced Web Application Security Testing

Live Training English
Course is offered in English

Course Overview

This course is designed to take knowledgeable web application security testers into the realm of expertise - equipping them with knowledge of advanced web application testing techniques and penetration testing tools. Participants will learn about many important web vulnerabilities like HTML5 attacks, business logic attacks, web services attacks, and AJAX/JSON specific vulnerabilities and issues.

Upon completion of this course, participants will be able to:

  • Build a security test plan, driven by threat modeling
  • Efficiently and accurately identify the high-risk areas of an application
  • Understand and apply sophisticated web application testing techniques
  • Identify vulnerabilities in web applications that are unlikely to be found using automated tools

Course Modules

The OWASP Top 10 Review

This module recaps the OWASP 10 most critical web application vulnerabilities. This provides a good review of foundational information to help the student understand the vulnerabilities and the advanced testing techniques.

HTML5 Attacks

This module discusses HTML5 has tags, event handlers, and APIs that offer the attacker many more possible attack vectors. This module focuses on HTML5 attacks - web storage, cross-site scripting, clickjacking, cross origin resource sharing (CORS) attacks.

Business Logic Attacks

Business logic attacks result from flaws in the business logic or functionality of an application that allow an attacker to manipulate the flow/functionality to the attacker’s advantage. Many of these attacks can only be performed by a human tester because automated tools do not have the intelligence to find these vulnerabilities. This module describes effective manual test techniques that need to be conducted to determine if your application is vulnerable to business logic attacks.

XML Attacks

XML is a standard for exchanging structured data in text format and is used heavily in modern applications. This module presents a variety of XML attacks and techniques that testers can use to find the vulnerabilities.

Web Services Attacks

A natural follow-on to XML attacks is a discussion of web services attacks. Web services are XML-based messaging interfaces to computing resources. In this module, the instructor describes various types of web services attacks and countermeasures that can be implemented to mitigate them.


AJAX and JSON are popular technologies used to create interactive web sites. This module covers parameter manipulation, injection attacks, and JavaScript highjacking.

Silverlight and Flash Attacks

Rich client applications leveraging Silverlight and Flash can push business logic from the server to the client, making Silverlight and Flash applets excellent attack targets. This module focuses on techniques for attacking these technologies to determine if your rich client application is vulnerable.  

In all of the modules, each attack is described and the techniques to verify the vulnerability are shown.