Seasides

Web Application Vulnerabilities Primer

Day 1February 19, 2026
09:00 AM
Goa, India

Overview

Web Application Vulnerabilities Primer (Beginner Level)

Total Duration: 6 Hours

Audience: Beginners with Minimal Web Pentesting Experience

Format: Theory + Hands-on Labs

Core Coverage: OWASP Top 10 (2025) + Practical Vulnerability Exploitation

Outcome: By the end of this 1-day training, participants will Understand OWASP Top 10 (2025) clearly, Exploit real beginner-friendly vulnerabilities safely, and Build confidence in structured web pentesting workflows.

Web Application Vulnerabilities Primer
(Beginner Level)

Total Duration: 6 Hours

Audience: Beginners with Minimal Web Pentesting Experience

Format: Theory + Hands-on Labs

Core Coverage: OWASP Top 10 (2025) + Practical Vulnerability Exploitation

Training Agenda (6 Hours Total)

Session 1: Web Application Pentesting Foundations
Theory
What is Web Application Security?
Role of a Web Pentester in an organization
Understanding how modern web apps work:
Client vs Server
Requests, Responses, Sessions, Cookies
Introduction to the Pentesting Lifecycle:
Recon → Testing → Exploitation → Reporting
Practical
Walkthrough of the lab environment
Burp Suite basics (Intercept, Repeater, Replaying Requests)
Session 2: OWASP Top 10 (2025) – Big Picture +
Pentester Mindset
Theory
What is OWASP and why Top 10 matters
How attackers think vs how developers build
Mapping OWASP risks to real-world breaches
Activity
Identifying attack surfaces in a sample application
Pentester mindset exercise: “Where could this break?”

Session 3: Injection Vulnerabilities (SQLi, Command Injection, SSTI)

SQL Injection
Introduction to SQL Injection
Why SQLi is still one of the most critical web vulnerabilities
Types of SQL Injection:
Authentication-based SQLi
Union-based SQLi
Error-based SQLi
Database-specific SQLi (Oracle focus)
Understanding how SQL queries get manipulated by attackers
Labs
SQL Injection vulnerability allowing login bypass
SQL Injection attack to identify database type and version (Oracle)
OS Command Injection
Introduction to Command Injection
Common injection points in web apps
Labs
OS Command Injection (simple case)
Server-Side Template Injection (SSTI)
Introduction to SSTI
Template engines and how rendering works
Identifying unsafe template usage
Labs
Basic Server-Side Template Injection

Session 4: Authentication + Access Control Failures

Authentication Failures
Introduction to Authentication vulnerabilities
Weaknesses in login and multi-step verification flows
Common failures:
MFA/2FA bypass issues
Broken reset mechanisms
Session handling weaknesses
Labs
2FA simple bypass
Password reset broken logic
Access Control Failures
Introduction to Broken Access Control
Why authorization failures are the #1 OWASP risk
Types of access control flaws:
Missing role enforcement
Direct access to admin endpoints
URL-based privilege escalation
Labs
Unprotected admin functionality
URL-based access control can be circumvented
Session 5: Cross-Site Request Forgery (CSRF)
CSRF Topic
Introduction to CSRF
How attackers abuse authenticated user sessions
Understanding CSRF in state-changing requests
Real-world CSRF bypass scenarios
Labs
CSRF vulnerability with no defenses
CSRF where token validation depends on request method
Session 6: Cross-Site Scripting (XSS)
XSS Topic
Introduction to XSS
Why XSS is still a major client-side attack vector
Types of XSS:
Reflected XSS
Stored XSS
DOM-based XSS
Understanding contexts:
HTML context
Attribute context
JavaScript context
Secure output encoding principles
Labs
Reflected XSS into HTML context with nothing encoded
Stored XSS into HTML context with nothing encoded
DOM XSS in document.write sink using location.search

Session 7: Path Traversal + File Upload Vulnerabilities

Path Traversal
Introduction to Path Traversal
How file systems are exposed through web applications
Common traversal patterns and restrictions
Bypass techniques when filters are applied
Real-world impact: reading sensitive server files
Labs
File path traversal (simple case)
File path traversal with blocked sequences and absolute path bypass
File Upload Vulnerabilities
Introduction to File Upload Risks
Why upload features are high-risk
Common insecure validations:
Extension checks
Content-Type checks
Labs
Remote code execution via web shell upload
Web shell upload via Content-Type restriction bypass

Session 8: Modern Client-Side + Business Logic Vulnerabilities

Prototype Pollution
Introduction to Prototype Pollution
Why modern JavaScript applications are vulnerable
Client-side pollution via unsafe object handling
Labs
Client-side prototype pollution via browser APIs
Business Logic Vulnerabilities
Introduction to Business Logic flaws
Difference between technical bugs vs workflow abuse
Examples of logic vulnerabilities:
Trusting client-side controls
Breaking application assumptions
Why these are hard to detect automatically
Labs
Excessive trust in client-side controls
Low-level logic flaw
Lab Requirements
Laptop with Admin Privileges
Burp Suite Community Edition
Browser (Chrome/Firefox)
Practice Platform: PortSwigger Web Security Academy Labs ● Practice with avatao labs
Web Application Vulnerabilities Primer | Seasides 2026