Reversing Engineering Web Applications for Security - Behavior Analysis and WAF Detection
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
About Sucuri Security
A Note on the Examples
Motivations
Agenda
Reverse Engineering
Whitelisting
Our Scope: Waf Detection
Detection steps Analyze Application Structure
The HTTP Protocol
Traffic Analysis
Crawling the Application
GET Request
Oh wait! Get a job from the headers...
Full Request
What's wrong here?
What about here?
Summary of Flow Parsing
File Structure
WordPress Tarball
The Basic WP Structure
xmlrpc.php
XMLRPC Login Attempt
Brute forcing New Brute Force Attacks Exploiting XMLRPC in
Pingback
wp-admin/ "Access"
Restriction Samples: .htaccess
Mitigating Attack Surface
Realtime Monitoring w/ OSSEC
Threshold Ideas
Special File Permissions
Counter Intelligence
Behavior: How you look at problems
GEO IP Block: Top Attack Countries
Top Methods
HTTP Version 1.0
In summary...
Taught by
OWASP Foundation
Related Courses
Security Event Triage: Revealing Attacker Methodology in Web Application EventsPluralsight Securing Applications in Microsoft Azure
Pluralsight AWS Administration: Security Fundamentals
LinkedIn Learning AWS Certified Solutions Architect - Associate (SAA-C02): 7 Application Deployment
LinkedIn Learning Azure Administration: Load Balancers and Application Gateways
LinkedIn Learning