WEB - SECURITY Course Outline
WEB - SECURITY Course Outline
December 7, 2024
Course Objective
The web is our gateway to many critical services and is quickly evolving as
a platform to connect all our devices. Web vulnerabilities are growing on
a year-to-year basis, and designing secure web applications is challenging.
This course introduces students to the field of web security: how to build
secure web applications.
The goal of this course is to enable students to:
Course Content
1. Web Basics: HTML, CSS, JS, URLs, DOM, Frames, HTTP, Navi-
gation, Cross-Domain Communication.
3. Limitations of HTTPS.
1
7. Authentication Flaws.
References
1. Gollman D. (2011). Computer Security, 3rd edition.
2
5-Day Course Plan
Day 1: Introduction to Web Security and Fundamen-
tals
Topics:
• Introduction to Web Security:
– Importance of securing web applications.
– Overview of common vulnerabilities and their impact.
• Web Basics:
– HTML, CSS, and JS fundamentals.
– Understanding URLs and DOM structure.
– Frames, HTTP request-response cycle, navigation.
– Introduction to Cross-Domain Communication.
• Network Attacks and HTTPS:
– Basics of HTTPS and its role in securing web traffic.
– Examples of network-based attacks: eavesdropping, man-in-
the-middle (MITM), and DNS spoofing.
Activities:
• Analyze a simple HTML page and identify its elements (tags, struc-
ture).
• Discuss scenarios where HTTPS protects data and where it may fail.
3
– Understanding same-origin policy (SOP) and its importance.
– Attack vectors enabled by SOP bypasses.
• Authentication Flaws:
Activities:
• Students analyze a login form and identify weaknesses.
– SQL Injection:
∗ Exploiting improperly sanitized inputs.
∗ Extracting sensitive data via SQLi.
– OS Command Injection and HTTP Header Injection:
∗ Understanding and demonstrating potential exploits.
• Cookie Flaws and Server Misconfiguration:
4
Activities:
• Simulate an XSS attack on a demo web application.
• Perform basic SQL Injection to retrieve data in a controlled environ-
ment.
5
– A presentation summarizing findings and fixes.
Tools:
• Same tools as Day 4, plus any scripting tools needed for custom
exploit creation.