×
1 Choose EITC/EITCA Certificates
2 Learn and take online exams
3 Get your IT skills certified

Confirm your IT skills and competencies under the European IT Certification framework from anywhere in the world fully online.

EITCA Academy

Digital skills attestation standard by the European IT Certification Institute aiming to support Digital Society development

LOG IN TO YOUR ACCOUNT

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR PASSWORD?

AAH, WAIT, I REMEMBER NOW!

CREATE AN ACCOUNT

ALREADY HAVE AN ACCOUNT?
EUROPEAN INFORMATION TECHNOLOGIES CERTIFICATION ACADEMY - ATTESTING YOUR PROFESSIONAL DIGITAL SKILLS
  • SIGN UP
  • LOGIN
  • INFO

EITCA Academy

EITCA Academy

The European Information Technologies Certification Institute - EITCI ASBL

Certification Provider

EITCI Institute ASBL

Brussels, European Union

Governing European IT Certification (EITC) framework in support of the IT professionalism and Digital Society

  • CERTIFICATES
    • EITCA ACADEMIES
      • EITCA ACADEMIES CATALOGUE<
      • EITCA/CG COMPUTER GRAPHICS
      • EITCA/IS INFORMATION SECURITY
      • EITCA/BI BUSINESS INFORMATION
      • EITCA/KC KEY COMPETENCIES
      • EITCA/EG E-GOVERNMENT
      • EITCA/WD WEB DEVELOPMENT
      • EITCA/AI ARTIFICIAL INTELLIGENCE
    • EITC CERTIFICATES
      • EITC CERTIFICATES CATALOGUE<
      • COMPUTER GRAPHICS CERTIFICATES
      • WEB DESIGN CERTIFICATES
      • 3D DESIGN CERTIFICATES
      • OFFICE IT CERTIFICATES
      • BITCOIN BLOCKCHAIN CERTIFICATE
      • WORDPRESS CERTIFICATE
      • CLOUD PLATFORM CERTIFICATENEW
    • EITC CERTIFICATES
      • INTERNET CERTIFICATES
      • CRYPTOGRAPHY CERTIFICATES
      • BUSINESS IT CERTIFICATES
      • TELEWORK CERTIFICATES
      • PROGRAMMING CERTIFICATES
      • DIGITAL PORTRAIT CERTIFICATE
      • WEB DEVELOPMENT CERTIFICATES
      • DEEP LEARNING CERTIFICATESNEW
    • CERTIFICATES FOR
      • EU PUBLIC ADMINISTRATION
      • TEACHERS AND EDUCATORS
      • IT SECURITY PROFESSIONALS
      • GRAPHICS DESIGNERS & ARTISTS
      • BUSINESSMEN AND MANAGERS
      • BLOCKCHAIN DEVELOPERS
      • WEB DEVELOPERS
      • CLOUD AI EXPERTSNEW
  • FEATURED
  • SUBSIDY
  • HOW IT WORKS
  •   IT ID
  • ABOUT
  • CONTACT
  • MY ORDER
    Your current order is empty.
EITCIINSTITUTE
CERTIFIED

EITC/IS/WAPT Web Applications Penetration Testing

by EITCA Academy / Monday, 18 October 2021 / Published in

Current Status

Not Enrolled
Enroll in this programme to get access

Price

€110.00

Get Started

Enrol for this Certification

EITC/IS/WAPT Web Applications Penetration Testing is the European IT Certification programme on theoretical and practical aspects of web application penetration testing (white hacking), including various technics for web sites spidering, scanning and attack techniques, including specialized penetration testing tools and suites.

The curriculum of the EITC/IS/WAPT Web Applications Penetration Testing covers introduction to Burp Suite, web spridering and DVWA, brute force testing with Burp Suite, web application firewall (WAF) detection with WAFW00F, target scope and spidering, discovering hidden files with ZAP, WordPress vulnerability scanning and username enumeration, load balancer scan, cross-site scripting, XSS – reflected, stored and DOM, proxy attacks, configuring the proxy in ZAP, files and directories attacks, file and directory discovery with DirBuster, web attacks practice, OWASP Juice Shop, CSRF – Cross Site Request Forgery, cookie collection and reverse engineering, HTTP Attributes – cookie stealing, SQL injection, DotDotPwn – directory traversal fuzzing, iframe injection and HTML injection, Heartbleed exploit – discovery and exploitation, PHP code injection, bWAPP – HTML injection, reflected POST, OS command injection with Commix, server-side include SSI injection, pentesting in Docker, OverTheWire Natas, LFI and command injection, Google hacking for pentesting, Google Dorks For penetration testing, Apache2 ModSecurity, as well as Nginx ModSecurity, within the following structure, encompassing comprehensive and structured EITCI certification curriculum self-learning materials supported by referenced open-access video didactic content as a basis for preparation towards earning this EITC Certification by passing a corresponding examination.

Web application security (often referred to as Web AppSec) is the concept of designing websites to function normally even when they are attacked. The notion is integrating a set of security measures into a Web application to protect its assets from hostile agents. Web applications, like all software, are prone to flaws. Some of these flaws are actual vulnerabilities that can be exploited, posing a risk to businesses. Such flaws are guarded against via web application security. It entails employing secure development approaches and putting in place security controls throughout the software development life cycle (SDLC), ensuring that design flaws and implementation issues are addressed. Online penetration testing, which is carried out by experts who aim to uncover and exploit web application vulnerabilities using a so-called white hacking approach, is an essential practice in order to enable appropriate defense.

A web penetration test, also known as a web pen test, simulates a cyber assault on a web application in order to find exploitable flaws. Penetration testing is frequently used to supplement a web application firewall in the context of web application security (WAF). Pen testing, in general, entails attempting to penetrate any number of application systems (e.g., APIs, frontend/backend servers) in order to find vulnerabilities, such as unsanitized inputs that are vulnerable to code injection attacks.

The online penetration test’s findings can be used to configure WAF security policies and address discovered vulnerabilities.

Penetration testing has five steps.

The pen testing procedure is divided into five steps.

  1. Planning and scouting
    Defining the scope and goals of a test, including the systems to be addressed and the testing methodologies to be utilized, is the first stage.
    To gain a better understanding of how a target works and its potential weaknesses, gather intelligence (e.g., network and domain names, mail server).
  2. Scanning
    The next stage is to figure out how the target application will react to different types of intrusion attempts. This is usually accomplished by employing the following methods:
    Static analysis – Examining an application’s code to predict how it will behave when it is run. In a single pass, these tools can scan the entire code.
    Dynamic analysis is the process of inspecting an application’s code while it is operating. This method of scanning is more practical because it provides a real-time view of an application’s performance.
  3. Obtaining access
    To find a target’s weaknesses, this step employs web application assaults such as cross-site scripting, SQL injection, and backdoors. To understand the damage that these vulnerabilities might inflict, testers try to exploit them by escalating privileges, stealing data, intercepting traffic, and so on.
  4. Keeping access
    The purpose of this stage is to assess if the vulnerability can be exploited to establish a long-term presence in the compromised system, allowing a bad actor to get in-depth access. The goal is to mimic advanced persistent threats, which can stay in a system for months in order to steal a company’s most sensitive information.
  5. Analysis
    The penetration test results are then put into a report that includes information such as:
    Vulnerabilities that were exploited in detail
    Data that was obtained that was sensitive
    The amount of time the pen tester was able to stay unnoticed in the system.
    Security experts use this data to assist configure an enterprise’s WAF settings and other application security solutions in order to patch vulnerabilities and prevent further attacks.

Methods of penetration testing

  • External penetration testing focuses on a firm’s assets that are visible on the internet, such as the web application itself, the company website, as well as email and domain name servers (DNS). The objective is to obtain access to and extract useful information.
  • Internal testing entails a tester having access to an application behind a company’s firewall simulating a hostile insider attack. This isn’t necessary a rogue employee simulation. An employee whose credentials were obtained as a result of a phishing attempt is a common starting point.
  • Blind testing is when a tester is simply provided the name of the company that is being tested. This allows security experts to see how an actual application assault might play out in real time.
  • Double-blind testing: In a double-blind test, security professionals are unaware of the simulated attack beforehand. They won’t have time to shore up their fortifications before an attempted breach, just like in the real world.
  • Targeted testing – in this scenario, the tester and security staff collaborate and maintain track of each other’s movements. This is an excellent training exercise that gives a security team real-time feedback from the perspective of a hacker.

Web application firewalls and penetration testing

Penetration testing and WAFs are two separate but complementary security techniques. The tester is likely to leverage WAF data, such as logs, to find and exploit an application’s weak areas in many types of pen testing (with the exception of blind and double blind tests).

In turn, pen testing data can help WAF administrators. Following the completion of a test, WAF configurations can be modified to protect against the flaws detected during the test.

Finally, pen testing satisfies certain of the security auditing methods’ compliance requirements, such as PCI DSS and SOC 2. Certain requirements, such as PCI-DSS 6.6, can only be met if a certified WAF is used. However, due to the aforementioned benefits and potential to modify WAF settings, this does not make pen testing any less useful.

What is the significance of web security testing?

The goal of web security testing is to identify security flaws in Web applications and their setup. The application layer is the primary target (i.e., what is running on the HTTP protocol). Sending different forms of input to a Web application to induce problems and make the system respond in unexpected ways is a common approach to test its security. These “negative tests” look to see if the system is doing anything it wasn’t intended to accomplish.

It’s also vital to realize that Web security testing entails more than just verifying the application’s security features (such as authentication and authorization). It’s also important to ensure that other features are deployed safely (e.g., business logic and the use of proper input validation and output encoding). The purpose is to make sure that the Web application’s functions are safe.

What are the many types of security assessments?

  • Test for Dynamic Application Security (DAST). This automated application security test is best suited for low-risk, internal-facing apps that must meet regulatory security requirements. Combining DAST with some manual online security testing for common vulnerabilities is the best strategy for medium-risk apps and important applications undergoing minor changes.
  • Security Check for Static Applications (SAST). This application security strategy includes both automated and manual testing methods. It’s ideal for detecting bugs without having to run apps in a live environment. It also allows engineers to scan source code to detect and fix software security flaws in a systematic manner.
  • Penetration Examination. This manual application security test is ideal for essential applications, particularly those that are undergoing significant changes. To find advanced attack scenarios, the evaluation uses business logic and adversary-based testing.
  • Application Self-Protection in the Runtime (RASP). This growing application security method incorporates a variety of technology techniques to instrument an application so that threats may be watched and, hopefully, prevented in real time as they occur.

What role does application security testing play in lowering company’s risk?

The vast majority of attacks on web applications include:

  • SQL Injection
  • XSS (Cross Site Scripting)
  • Remote Command Execution
  • Path Traversal Attack
  • Restricted content access
  • Compromised user accounts
  • Malicious code installation
  • Lost sales revenue
  • Customers’ trust eroding
  • Brand reputation harming
  • And a lot of other attacks

In today’s Internet environment, a Web application might be harmed by a variety of challenges. The graphic above depicts a few of the most common attacks perpetrated by attackers, each of which can cause significant damage to an individual application or an entire business. Knowing the many assaults that render an application vulnerable, as well as the possible results of an attack, allows company to resolve vulnerabilities ahead of time and effectively test for them.

Mitigating controls can be established throughout the early phases of the SDLC to prevent any issues by identifying the root cause of the vulnerability. During a Web application security test, knowledge of how these threats work can also be used to target known places of interest.

Recognizing the impact of an attack is also important for managing company’s risk, as the impacts of a successful attack may be used to determine the severity of the vulnerability overall. If vulnerabilities are discovered during a security test, determining their severity allows company to prioritize remedial efforts more effectively. To reduce risk to company, start with critical severity issues and work one’s way down to lower impact ones.

Prior to identifying an issue, assessing the possible impact of each program in company’s application library will help you prioritize application security testing. Wenb security testing can be scheduled to target firm’s critical applications first, with more targeted testing to lower the risk against the business. With an established list of high-profile applications, wenb security testing can be scheduled to target firm’s critical applications first, with more targeted testing to lower the risk against the business.

During a web application security test, what features should be examined?

During Web application security testing, consider the following non-exhaustive list of features. An ineffective implementation of each could result in weaknesses, putting company at danger.

  • Configuration of the application and server. Encryption/cryptographic setups, Web server configurations, and so on are all examples of potential flaws.
  • Validation of input and error handling Poor input and output processing leads to SQL injection, cross-site scripting (XSS), and other typical injection issues.
  • Authentication and maintenance of sessions. Vulnerabilities that could lead to user impersonation. Credential strength and protection should be taken into account as well.
  • Authorization. The application’s capacity to protect against vertical and horizontal privilege escalations is being tested.
  • Logic in business. Most programs that provide business functionality rely on these.
  • Logic on the client’s end. This type of feature is becoming more common with modern, JavaScript-heavy webpages, as well as webpages using other types of client-side technologies (e.g., Silverlight, Flash, Java applets).

To acquaint yourself in-detail with the certification curriculum you can expand and analyze the table below.

The EITC/IS/WAPT Web Applications Penetration Testing Certification Curriculum references open-access didactic materials in a video form. Learning process is divided into a step-by-step structure (programmes -> lessons -> topics) covering relevant curriculum parts. Participants can access answers and ask more relevant questions in the Questions and answers section of the e-learning interface under currently progressed EITC programme curriculum topic. Direct and unlimited consultancy with domain experts is also accessible via the platform integrated online messaging system, as well as through the contact form.
For details on the Certification procedure check How it Works.

Download the complete offline self-learning preparatory materials for the EITC/IS/WAPT Web Applications Penetration Testing programme in a PDF file

PDF Icon EITC/IS/WAPT preparatory materials – standard version

PDF Icon EITC/IS/WAPT preparatory materials – extended version with review questions

Certification Programme Curriculum

Getting started 1 Topic
You don't currently have access to this content
Lesson Content
0% Complete 0/1 Steps
Introduction to Burp Suite
Spidering 1 Topic
You don't currently have access to this content
Lesson Content
0% Complete 0/1 Steps
Spidering and DVWA
Brute force testing 1 Topic
You don't currently have access to this content
Lesson Content
0% Complete 0/1 Steps
Brute force testing with Burp Suite
Firewall detection 1 Topic
You don't currently have access to this content
Lesson Content
0% Complete 0/1 Steps
Web application firewall detection with WAFW00F
Target scope 1 Topic
You don't currently have access to this content
Lesson Content
0% Complete 0/1 Steps
Target scope and spidering
Hidden files 1 Topic
You don't currently have access to this content
Lesson Content
0% Complete 0/1 Steps
Discovering hidden files with ZAP
WordPress 1 Topic
You don't currently have access to this content
Lesson Content
0% Complete 0/1 Steps
WordPress vulnerability scanning and username enumeration
Load balancing 1 Topic
You don't currently have access to this content
Lesson Content
0% Complete 0/1 Steps
Load balancer scan
Cross-site scripting 1 Topic
You don't currently have access to this content
Lesson Content
0% Complete 0/1 Steps
XSS – reflected, stored and DOM
Proxy attacks 1 Topic
You don't currently have access to this content
Lesson Content
0% Complete 0/1 Steps
ZAP – configuring the proxy
Files and directories attacks 1 Topic
You don't currently have access to this content
Lesson Content
0% Complete 0/1 Steps
File and directory discovery with DirBuster
Web attacks practice 12 Topics
You don't currently have access to this content
Lesson Content
0% Complete 0/12 Steps
Installing OWASP Juice Shop
CSRF – Cross Site Request Forgery
Cookie collection and reverse engineering
HTTP Attributes – cookie stealing
OWASP Juice Shop – SQL injection
DotDotPwn – directory traversal fuzzing
Iframe Injection and HTML injection
Heartbleed Exploit – discovery and exploitation
PHP code injection
bWAPP – HTML injection – reflected POST
bWAPP – HTML injection – stored – blog
bWAPP – Server-Side Include SSI injection
Pentesting in Docker 2 Topics
You don't currently have access to this content
Lesson Content
0% Complete 0/2 Steps
Docker for pentesting
Docker for pentesting on Windows
OverTheWire Natas 2 Topics
You don't currently have access to this content
Lesson Content
0% Complete 0/2 Steps
OverTheWire Natas walkthrough – level 0-4
OverTheWire Natas walkthrough – level 5-10 – LFI and command injection
Google hacking for pentesting 1 Topic
You don't currently have access to this content
Lesson Content
0% Complete 0/1 Steps
Google Dorks For penetration testing
ModSecurity 2 Topics
You don't currently have access to this content
Lesson Content
0% Complete 0/2 Steps
Apache2 ModSecurity
Nginx ModSecurity
EITC/IS/WAPT Web Applications Penetration Testing
You don't currently have access to this content
Home » My Account

Certification Center

Programme Home
Getting started
Introduction to Burp Suite
Spidering
Spidering and DVWA
Brute force testing
Brute force testing with Burp Suite
Firewall detection
Web application firewall detection with WAFW00F
Target scope
Target scope and spidering
Hidden files
Discovering hidden files with ZAP
WordPress
WordPress vulnerability scanning and username enumeration
Load balancing
Load balancer scan
Cross-site scripting
XSS – reflected, stored and DOM
Proxy attacks
ZAP – configuring the proxy
Files and directories attacks
File and directory discovery with DirBuster
Web attacks practice
Installing OWASP Juice Shop
CSRF – Cross Site Request Forgery
Cookie collection and reverse engineering
HTTP Attributes – cookie stealing
OWASP Juice Shop – SQL injection
DotDotPwn – directory traversal fuzzing
Iframe Injection and HTML injection
Heartbleed Exploit – discovery and exploitation
PHP code injection
bWAPP – HTML injection – reflected POST
bWAPP – HTML injection – stored – blog
bWAPP – Server-Side Include SSI injection
Pentesting in Docker
Docker for pentesting
Docker for pentesting on Windows
OverTheWire Natas
OverTheWire Natas walkthrough – level 0-4
OverTheWire Natas walkthrough – level 5-10 – LFI and command injection
Google hacking for pentesting
Google Dorks For penetration testing
ModSecurity
Apache2 ModSecurity
Nginx ModSecurity
EITC/IS/WAPT Web Applications Penetration Testing

USER MENU

  • My Account

CERTIFICATE CATEGORY

  • EITC Certification (105)
  • EITCA Certification (9)

What are you looking for?

  • Introduction
  • How it works?
  • EITCA Academies
  • EITCI DSJC Subsidy
  • Full EITC catalogue
  • Your order
  • Featured
  •   IT ID
  • EITCA reviews (Medium publ.)
  • About
  • Contact

EITCA Academy is a part of the European IT Certification framework

The European IT Certification framework has been established in 2008 as a Europe based and vendor independent standard in widely accessible online certification of digital skills and competencies in many areas of professional digital specializations. The EITC framework is governed by the European IT Certification Institute (EITCI), a non-profit certification authority supporting information society growth and bridging the digital skills gap in the EU.

Eligibility for EITCA Academy 80% EITCI DSJC Subsidy support

80% of EITCA Academy fees subsidized in enrolment by

    EITCA Academy Secretary Office

    European IT Certification Institute ASBL
    Brussels, Belgium, European Union

    EITC / EITCA Certification Framework Operator
    Governing European IT Certification Standard
    Access contact form or call +32 25887351

    Follow EITCI on X
    Visit EITCA Academy on Facebook
    Engage with EITCA Academy on LinkedIn
    Check out EITCI and EITCA videos on YouTube

    Funded by the European Union

    Funded by the European Regional Development Fund (ERDF) and the European Social Fund (ESF) in series of projects since 2007, currently governed by the European IT Certification Institute (EITCI) since 2008

    Information Security Policy | DSRRM and GDPR Policy | Data Protection Policy | Record of Processing Activities | HSE Policy | Anti-Corruption Policy | Modern Slavery Policy

    Automatically translate to your language

    Terms and Conditions | Privacy Policy
    EITCA Academy
    • EITCA Academy on social media
    EITCA Academy


    © 2008-2025  European IT Certification Institute
    Brussels, Belgium, European Union

    TOP
    Chat with Support
    Chat with Support
    Questions, doubts, issues? We are here to help you!
    End chat
    Connecting...
    Do you have any questions?
    Do you have any questions?
    :
    :
    :
    Send
    Do you have any questions?
    :
    :
    Start Chat
    The chat session has ended. Thank you!
    Please rate the support you've received.
    Good Bad