Yasho Application Security Course (YAS)
List of recommended books for the course
Chapter 1 - What is this course
- Who am I?
- What is going to be covered?
- How is this course going to be published?
Chapter 2 - Internet
- Introduction
- Network nodes
- server
- client
- host
- What is the Internet?
- OSI model
- Introduction and example
- TCP/UDP
- Connection
- IP and Port
- Public and Private IP
- 3-way TCP handshake
- Netcat, make a connection
- Web server
- Concept
- Connecting to a webserver
- Domain name system (DNS)
- Concept
- How DNS works?
- DNS server
- DNS client
- Name server
- DNS lookup by DIG
- Host file
- Capturing the traffic
- Wireshark
- TCPDump
- Final words
Chapter 3 - HTTP protocol
- Versions and RFCs
- Webserver again
- URLs
- Syntax and parts
- Check a URL list
- HTTP
- Message
- Request line
- HTTP method
- Status line
- Headers
- Body
- Sending some HTTP requets
- the list of all headers
- Important headers
- Authentication
- Caching
- Conditional
- Cookie
- CORS
- Message Body
- Proxies
- Redirects
- Request Context
- Security
- Important headers
- HTTPS
- Reveiw, Problem
- Symmetric Encryption
- Asymmetric Encryption
- Signature and authentication
- SSL Protocol
- Certificates and authorities
- Trust chain
- How does SSL work?
- The handshake
- Implementation
- Security issues
Chapter 4 - Web application architecture
- Web server
- Installing Apache
- Configuring Apache
- ServerRoot
- Listen
- User and Group
- ServerName
- DocumentRoot
- ErrorLog
- Directory
- Files
- IfModule
- Include
- IncludeOptional
- Process owner
- Packet flow
- Some comcepts
- Virtual host
- Configuration
- Access
- Mapping
- htaccess
- Wrerite module
- Virtual host
- Security
- IP based authentication
- Checking referrer header
- Denying sensitive directories
- Authentication
- types
- Configuring basic authentication
- Attack on basic authentication
- Brute force
- Sniffing
- Web application
- Static vs dynamic resources
- How webservers can make dynamic contents?
- What is directory traversal?
- Let's trace users inputs
- Authentication
- How it works in web applications?
- Handling authentication by cookie
- Handling authentication by session
- Handling authentication with a Database
Chapter 5 - Security
- Vulnerability
- The root cause
- Technical vulnerabilities
- Logical vulnerabilities
- Severity
- Categories
- CVSS score
- Exploit
- Payload
- Attack vector
- CVE
- 0day, 1day
- OWASP
- The security triangle
- Availability
- Integrity
- Confidentiality
- Security Concepts
- Privilege escalation
- Sniffing
- Man in the middle
- Security assessment tools and scripts
- Security scanners
- Kali linux
- Defense in depth
- Devices
- Firewall
- IDS, IPS
- WAF
- Definitions
- SSLDC
- Hardenning
- Vulnerability assessment
- Penetration test
- Red team penetration test
- Bug bounty
- SIEM and SOC
Chapter 6 - OWASP TOP 10
- Introduction to SQL injection
- Introduction to Command injection
- Introduction to Remote Code Injection
- Introduction to Broken Authentication
- Introduction to Sensitive Data Exposure
- Introduction to XML External Entities
- Introduction to Broken Access Control
- Concept
- Insecure Direct Object Reference
- Introduction to Security Misconfiguration
- Introduction to Cross-Site Script
- Concept
- Discovery
- Impact
- Introduction to Insecure Deserialization
- Using component with known vulnerabilities
- Insufficient Logging and Monitoring
Chapter 7 - More vulnerabilities
- Introduction to Open Redirect
- Introduction to Server Side Request Forgery
- Introduction to Race Condition
- Introduction to HTTP Smuggling
- Introduction to HTTP Cache Poisoning
- Introduction to HTTP Cache Deception
Chapter 8 - The end
- Vulnerability discovery
- The assessment methodology
- The hunting methodology