TCM Security - Practical Web Hacking - 2024

Joined
7 Feb 2026
Messages
98
Reaction score
115
Points
33
MYzfKK2RhCidf1p8kq0D_practical-bug-bounty-thumbnail.png

Course Overview

Welcome to this course on Practical Web Hacking. This course follows on from the Practical Bug Bounty course and will take you deeper into the world of finding and exploiting vulnerabilities in web applications. It’s recommended that you have completed the Practical Bug Bounty course or at least one year's worth of experience in hacking web applications before you take this course. In this course, you will develop a deeper understanding of how web attacks work, learn to craft custom payloads, and build a methodology for finding and exploiting more complex vulnerabilities.


The Practical Web Hacking Course Will Cover:

  • How web applications work
  • Authentication attacks
  • Broken access control
  • Server-side request forgery
  • Advanced SQL injection attacks and NoSQL injection
  • File inclusion
  • XML External Entity Injection
  • XSS and filter bypasses
  • Attacking JSON Web Tokens
  • Mass assignment
  • Open redirects
  • Race conditions
  • Capstone challenge

By the end of the course you will have a good understanding of how these attacks work, be able to find them in situations that are not immediately obvious or overlooked by automated scans and fuzzing. You will also be able to modify and craft custom payloads to bypass filters or achieve exploitation in unusual circumstances.



Prerequisites & System Requirements

  • A computer able to run a Linux virtual machine
  • Completion of the Practical Bug Bounty course OR 1 years web hacking experience
  • A positive attitude

Practical Web Hacking Course Objectives

Web Application Basics
  • Understand how web applications and their various components work.
Web Application Attacks
  • Understand common and intermediate attacks against web applications.
Web Application Reconnaissance
  • Identify potential weaknesses and vulnerabilities in web applications.
Web Application Exploitation
  • Learn to craft payloads to exploit an identified vulnerability.
 
  • Like
Reactions: nashyaung