AWAE-Preparation
This repository will contain all trainings and tutorials I have done/read to prepare for OSWE.
Course Syllabus:
https://www.offensive-security.com/documentation/awae-syllabus.pdf
Before AWAE:
I would not recommend taking the course before at least; finishing all SQL and XSS Injection challenges in bWAPP https://sourceforge.net/projects/bwapp/files/bee-box/ and being able to understand and debug different languages like C#, Php, Java, and Javascript.
-
Cross-Site Scripting:
-
Session Hijacking
-
Persistent Cross-Site Scripting
-
Cross-Site Request Forgery
-
XSS and MySQL
-
Bypassing File Upload Restrictions:
- https://www.exploit-db.com/docs/english/45074-file-upload-restrictions-bypass.pdf
- http://www.securityidiots.com/Web-Pentest/hacking-website-by-shell-uploading.html
- https://www.owasp.org/index.php/Unrestricted_File_Upload
- Popcorn machine from HackTheBox
- Vault machine from HackTheBox
-
PHP Type Juggling:
- https://www.owasp.org/images/6/6b/PHPMagicTricks-TypeJuggling.pdf
- https://medium.com/@Q2hpY2tlblB3bnk/php-type-juggling-c34a10630b10
- https://foxglovesecurity.com/2017/02/07/type-juggling-and-php-object-injection-and-sqli-oh-my/
- https://www.netsparker.com/blog/web-security/php-type-juggling-vulnerabilities/
- http://turbochaos.blogspot.com/2013/08/exploiting-exotic-bugs-php-type-juggling.html
- https://www.netsparker.com/blog/web-security/type-juggling-authentication-bypass-cms-made-simple/
- https://www.php.net/manual/en/types.comparisons.php
- https://github.com/spaze/hashes
- https://www.whitehatsec.com/blog/magic-hashes/
- Falafel machine from HackTheBox
-
Deserialization:
- https://cheatsheetseries.owasp.org/cheatsheets/Deserialization_Cheat_Sheet.html
- https://www.blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-Json-Attacks.pdf
- https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Deserialization_Cheat_Sheet.md
- https://2017.zeronights.org/wp-content/uploads/materials/ZN17_Aleksei%20Tiurin_Deserialization%20vulnerabilities.pdf
- https://www.exploit-db.com/docs/english/44756-deserialization-vulnerability.pdf
- https://www.blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-Json-Attacks.pdf
-
.NET Deserialization:
-
Java Deserialization:
- https://www.n00py.io/2017/11/exploiting-blind-java-deserialization-with-burp-and-ysoserial/
- https://www.owasp.org/images/7/71/GOD16-Deserialization.pdf
- https://github.com/frohoff/ysoserial
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet/blob/master/README.md
- https://diablohorn.com/2017/09/09/understanding-practicing-java-deserialization-exploits/
-
JavaScript Injection:
-
NodeJS:
- https://maikthulhu.github.io/2019-05-17-remote-debugging-node-vscode/
- https://github.com/ajinabraham/Node.Js-Security-Course
- https://www.acunetix.com/blog/web-security-zone/deserialization-vulnerabilities-attacking-deserialization-in-js/
- https://www.yeahhub.com/nodejs-deserialization-attack-detailed-tutorial-2018/
- Celestial machine from HackTheBox
-
SQLi:
-
PostgreSQL
- http://pentestmonkey.net/cheat-sheet/sql-injection/postgres-sql-injection-cheat-sheet
- http://www.leidecker.info/pgshell/Having_Fun_With_PostgreSQL.txt
- https://www.exploit-db.com/papers/13084
- http://www.postgresqltutorial.com/postgresql-string-functions/
- https://www.linuxtopia.org/online_books/database_guides/Practical_PostgreSQL_database/c7547_002.htm
- https://www.infigo.hr/files/INFIGO-TD-2009-04_PostgreSQL_injection_ENG.pdf
- https://dotcppfile.wordpress.com/2014/07/12/blind-postgresql-sql-injection-tutorial/
-
Long Readings:
- Use of Deserialization in .NET Framework Methods and Classes. https://www.nccgroup.trust/globalassets/our-research/uk/images/whitepaper-new.pdf
- https://www.blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-JSON-Attacks-wp.pdf
Before The Exam:
The Web Application Hacker's Handbook is your friend. The negative part of AWAE course is that they did not include enough methodologies for vulnerability discovery, thus, I strongly recommend reading Chapter 21 from The Web Application Hacker's Handbook , and be comfortable debugging C#, Java, Php, and Javascript, using Burp Suite, dnSpy, JD-GUI, Visual Studio, and writing custom PoC in at least one language :).