- Ethical hacking labs:
- Wesley has built many labs by hand for you or your team to explore and to learn how to hack. We have naked labs with just 1 issue type in them and we have bigger applications.
- Naked labs: https://hackxpert.com/labs/
- RatSite: https://hackxpert.com/ratsite/ (An emulated CRM in which we can toggle vulnerabilities on or off)
- Hackers Date: Hacking alone is not as much fun as hacking in a team or in duo, yet there are no real practice websites that aim solely at group assignments. We are in the alpha phase of the project and building our first feature which is duo assignments. It has a pool of 50 free challenges and 150 paid ones. The paid price for consumers will be set at 1.99$/mo, for B2B we can arrange a price, make sure to request an offer.
- Start2Hack
- Hack along in this starter course designed to help your employees develop a security mindset. In this course we start with some theory and talk about
- What goes into ethical hacking
- CSRF: Hack along with this issue type to get a feel for what it is
- XSS: Find out why it's more than what most people think
- API hacking with postman: APIs are rising fast so let's hack some and see what all the fuss is about.
- Requirements
- A laptop with postman installed (only needed for last part so can be left out, we will be adding more issue types in that case - XXE and LFI)
- Duration: 4h
- Vulnerability type reminder
- In this brown bag session, we will bring up a quick refresher on several issue types for experienced developers/testers who might know defensive coding but could use a refresher on the attacking side of things.
- CSRF
- BAC
- IDORs
- Business Logic flaws
- LFI/RFI
- Captcha bypass
- XXE
- XSS
- =========
- Might add if time allows it: CSP bypassess, SSRF and OS command injection
- Requirements:
- Duration:
- 1 hour with the option of going to 1 hour and 30 minutes with the addition of the OWASP api top 10
- Vulnerabilities for developers, architects and analysts
- In this session, we will be demonstrating why it is so hard to filter effectively in a life-like scenario. We will build, hack and try to secure our own code on the following issue types:
- Open redirects
- Reflected XSS
- Captcha bypasses
- LFI
- Requirements
- A laptop with an IDE (BBEdit,notepad++,intelliJ,...) that supports PHP
- Duration:
- Simulated pentest
- The candidates will go through the process of an actual pentest with the instructor, including the signing of all documentation, hacking, and debriefing. We want to give the students an application that they can not get tested fully within the timeframe to teach them they should expect to prioritize and sometimes work within very tight timeframes.
- Duration:
- 4 hours, 8 hours or 16 hours depending on the size of the application to hack
- An introduction to ethical hacking and pentesting
- In this 10-day boot camp, we will be creating full-on pentesters from your technical testers. We will teach them everything they need to know:
- Being ethical
- Creating test plans
- Network hacking
- Web application hacking
- Main application and broad scope
- API hacking
- Mobile hacking
- Different tools
- Reporting
- Debriefing
- Additionally we can cut this into a one-day bootcamp while leaving out API hacking and mobile hacking and different tools.
- Duration:
- 40-50 hours (10 additional hours possible to implement a methodology within the company)
- Bug Bounty Bootcamp
- In this 4-day boot camp, we are going to bring you from practice to the real platforms! It is time to pick up your weapons and hunt. We are going to show you 9 vulnerability types after starting off with an introduction to what bug bounties entail and the intricacies of bug bounties. On the last day, we pick an actual target and go hunting in groups of 2 on targets where collaboration is allowed. Disqualifiers:
- This is an advanced course and you are presumed to have a basic level of understanding of hacking and its facets.
- Linux knowledge is required
- Burp Suite or OWASP zap basic knowledge is required
- Courses:
- Android Bug Bounty Hunting: Hunt like a rat:
- Set up a mobile lab to test and hack before moving on to a starting methodology
- Ethical hacking guide A-Z:
- In this hands-on guide to ethical hacking, we cover several topics on a surface level to introduce you to the various aspects of our craft. This will leave you with a clear idea of what kind of hacking you like (network, API, website, mobile,...) and prepare you to take on the OSCP certificate if you so desire.
- Uncle rat’s bug bounty guide
- The OWASP top 10, mobile top 10 and API 10 demystified - A guide for pentesters, bug bounty hunters and managers
- The OWASP top 10 is often referenced when it comes to security and with good reason but the only problem is that the language they use can be quite conveluted. When it comes to security the last thing we need is a misunderstanding. In this course, we demystify the topics one by one for the entire web, API, and mobile top 10.
- API testing and securing guide
- In this practical guide, we go over the OWASP API top 10 vulnerability types before we dive into hacking some vulnerable APIs with postman to build a methodology for hacking and a mindset for securing APIs. In the age of microservices and API gateways, these skills are more off an essential than a luxury.
- This course also has a free version available that only exists of videos.
- Ethical hacking for devs, analysts and architects - A practical guide to building hacking and securing your application
- In this course, I have prepared a training FTP server for you to program, upload and hack your own labs. Want to learn how to secure an application? Learn how to make it vulnerable first!
- Uncle Rat's XSS Guide - <img src=x onerror=alert()>
- XSS is often misrepresented as an easy vulnerability but never explained properly, in this course we teach you the XSS mentality with ways on how to hunt for XSS in several contexts.
- Uncle Rat's XXE Guide
- People say XXE is dying but I disagree. With XML still being very prevalent, and some older libraries still allowing external entities, we still see this issue type on a regular basis, but what is it and how do we hunt for it? Find out in this amazing course!
- Web Application Firewall Handbook (WAFs explained)
- WAFs are everywhere, but did you know they are not as waterproof as some may think? First, we need to explore what a WAF is before we can dive into several bypasses and even install our own WAF on a VPS to explore what a ruleset is. (ModSecurity + core ruleset)
- Broad Scope Bug Bounties HandBook
- Bug bounties know single domain targets and broad scope targets (such as *.google.com) and both deserve a totally different mindset and mentality. We are going to build up a methodology of automation that will help you automatically rake in those bug bounties. All you need is a VPS.
- Burp Suite: Zero to Hero
- Burp suite is a Man-In-The-Middle proxy that can capture requests and has a rich feature to help you discover or automate certain exploits. By itself it can take a while to learn though and even if you know the basics, Burp suite has some hidden options that you can use for sure!
- We can adapt any training to the needs of your company and are happy to offer fully custom workshops or training as well. All trainings can be given in English or dutch. All trainings and workshops can be given on-site or via zoom call/google hangouts.