Practical Web Hacking

Expand your knowledge and skills in web application hacking with this Intermediate course.

Training for a team or organization? Contact us about group access.

Practical Web Hacking

Inside the Course

Scroll down to explore the skills you’ll build, the techniques you’ll master, and the requirements to get started.

Start Learning This Course Today

The All-Access Membership gives you unlimited access to this course, hands-on labs, and a complete library of cybersecurity training. Everything you need to build real-world skills is included.

Questions?

If you need clarification on the course or its requirements, simply use the chat button below and our team will assist you.

  • Difficulty: Intermediate
  • Duration: 10h
  • Access: Included in Membership

Overview

Welcome to this course on Practical Web Hacking. This course follows on from the Practical Bug Bounty course and will take you deeper into the world of finding and exploiting vulnerabilities in web applications. It’s recommended that you have completed the Practical Bug Bounty course or at least one year’s worth of experience in hacking web applications before you take this course. In this course, you will develop a deeper understanding of how web attacks work, learn to craft custom payloads, and build a methodology for finding and exploiting more complex vulnerabilities. 

Key Topics

  • How web applications work
  • Authentication attacks
  • Broken access control
  • Server-side request forgery
  • Advanced SQL injection attacks and NoSQL injection
  • File inclusion
  • XML External Entity Injection
  • XSS and filter bypasses
  • Attacking JSON Web Tokens
  • Mass assignment
  • Open redirects
  • Race conditions
  • Capstone challenge

By the end of the course you will have a good understanding of how these attacks work, be able to find them in situations that are not immediately obvious or overlooked by automated scans and fuzzing. You will also be able to modify and craft custom payloads to bypass filters or achieve exploitation in unusual circumstances.

Live Training Available for This Topic

Looking to go deeper? This course aligns with upcoming instructor-led sessions covering real-world applications and guided labs.

Objectives

Web Application Basics:

  • Understand how web applications and their various components work.

Web Application Attacks:

  • Understand common and intermediate attacks against web applications.

Web Application Reconnaissance:

  • Identify potential weaknesses and vulnerabilities in web applications.

Web Application Exploitation:

  • Learn to craft payloads to exploit an identified vulnerability.

System Requirements

  • A computer able to run a Linux virtual machine
  • Completion of the Practical Bug Bounty course OR 1 years web hacking experience
  •  A positive attitude

Recommended For

Practical Web Hacking is aimed at those who want to understand, find and exploit vulnerabilities within web applications for penetration testing and bug bounty hunting. This is an intermediate course so an understanding of web applications and basic attacks is required. If you’re new to web application security testing then we recommend you take the Practical Bug Bounty course first. This course is also ideal for experienced network penetration testers who want to improve their web application testing skills. 

Course Curriculum

  • Introduction
    • Welcome To The Course
    • Lab Setup
    • Course Support
    • Web Application Components
    • HTTP
  • Authentication
    • Introduction to Authentication
    • Brute-Force Attacks
    • Challenge Walkthrough
    • Response Timings
    • Challenge Walkthrough
    • Session Tokens and Sequencer
    • Multi-Factor Authentication
    • Challenge Walkthrough
  • Access Control
    • Introduction to Access Control
    • IDOR (Insecure Direct Object Reference)
    • Challenge Walkthrough
    • Attacking Weak Access Controls
    • Challenge Walkthrough
  • SSRF (Server-Side Request Forgery)
    • Introduction to SSRF
    • Challenge Walkthrough (feat. Turbo Intruder)
    • Blind SSRF
    • Challenge Walkthrough
  • SQL Injection
    • Introduction to SQL Injection
    • Blind SQL Injection
    • Challenge Waklthrough
    • NoSQL Injection
  • File Inclusion
    • Introduction to File Inclusion
    • File Inclusion Payloads
    • Challenge Walkthrough
    • Bypassing Filters
    • File Inclusion to RCE
    • Challenge Walkthrough
    • File Inclusion Prevention
  • XXE (XML External Entity Injection)
    • Introduction to XXE
    • Common XXE Attacks
    • Challenge Walkthrough
    • XXE via XInclude
    • Challenge Walkthrough
  • XSS / JavaScript Injection
    • Introduction to XSS
    • DOM Invader
    • Challenge Walkthrough
    • Going Beyond alert(1)
    • Filter and WAF Evasion Techniques
  • JWTs (JSON Web Tokens)
    • Introduction to JWTs
    • JWT Signature Attacks
    • Challenge Walkthrough
    • JWT_Tool
    • Header Injection
  • Mass Assignment
    • Mass Assignment
  • WebSockets
    • Introduction to WebSockets
    • WebSocket Hijacking
  • Open Redirects
    • Open Redirects
  • Race Conditions
    • Introduction to Race Conditions
    • Single Endpoint Race Conditions
    • Multi-Endpoint Race Conditions
    • Challenge Walkthrough
  • Capstone Challenge
    • Launching the Capstone
    • Capstone Walkthrough
    • Thank you & see you next time!
    • Next Steps: The Practical Web Pentest Professional (PWPP) Certification

This Course Is Included in Your All-Access Membership

One membership gives you ongoing access to Practical Web Hacking, every other paid Academy course, and an active community of learners and mentors in Discord.

INSTRUCTORS

Meet Your Instructor

Learn from industry experts with real-world cybersecurity experience.

Instructor Alex Olsen

Alex Olsen

Alex is a Web Application Security specialist with experience working across multiple sectors, from single-developer applications all the way up to enterprise web apps with tens of millions of users. He enjoys building applications almost as much as breaking them and has spent many years supporting the shift-left movement by teaching developers, infrastructure engineers, architects, and anyone who would listen about cybersecurity.

Alex holds a Master’s Degree in Computing, as well as CEH and OSCP certifications.

Prepare for the Practical Web Pentest Professional (PWPP) Exam

The PWPP certification will assess a student’s ability to perform a web application penetration test at an associate level.


Pair the Practical Web Hacking course with the PWPP exam to validate your skills with a recognized credential.

FAQS

Common Questions

Here are a couple of our most commonly asked questions, contact us if you don’t find an answer!

Can I get a refund if I'm unhappy with my purchase?
2
3

Yes. All courses come with a 24-hour money-back guarantee.

Will I receive a certificate of completion when I finish a course?
2
3

Yes. All courses come with a certificate of completion.

Do the courses count as Continuing Education Units (CEUs)?
2
3

Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.

What is the All-Access Membership?
2
3

As of July 1st, 2023 TCM Academy transitioned to a monthly subscription model, where you now receive full access to all of the courses on our platform for as long as your subscription remains active.

What if you already own courses on TCM Academy?
2
3

If you already own a course on our platform, you will continue to own that course. Previously owned courses will not be affected by this change.

I can see the course, but it won’t load or play. What should I do?
2
3

We use Cloudflare to protect our course platform and unfortunately, it does not play nice with VPNs. If you are experiencing issues, turn off your VPN and try again. If that does not solve the issue, please contact our support team at support@tcm-sec.com and we will help you out.

This course is included in our All-Access Membership, starting at $29.99/month.

Get full access to this course and our full course catalog when you enroll in our All-Access Membership.

Ready to level up your Cybersecurity Career?

Get unlimited access to every TCM Security Academy course, hands-on lab, and certification pathway with an All-Access Membership. Learn at your own pace, build real-world skills, and take the next step toward a career in cybersecurity.

PWPA