HackPathHackPath
CoursesRoadmapPracticePricing
>_
HackPath

Web Application Hacking

0%
Lessons
Fundamentals & Burp Suite
01Introduction to the OWASP Top 10
42 min
02Burp Suite — Essentials
55 min
Injection Risks
03SQL Injection (Defensive Understanding)
65 min
04Advanced SQLi Signals — Blind & Out-of-Band (Defensive View)
58 min
05OS Command Injection (Defensive Understanding)
48 min
XSS & CSRF
06XSS — Reflected, Stored & DOM (Defensive View)
60 min
07CSRF & Clickjacking (Defensive View)
45 min
Inclusion & SSRF
08File Inclusion & Path Traversal (Defensive View)
55 min
09SSRF — Server-Side Request Forgery (Defensive View)
50 min
Auth, Sessions & APIs
10Authentication & Session Security (Defensive View)
50 min
11REST API Security (Defensive View)
62 min
12IDOR & Mass Assignment (Defensive View)
52 min

Lesson 01

Introduction to the OWASP Top 10

Lesson details coming soon.

Web Application Hacking/Introduction to the OWASP Top 10

Introduction to the OWASP Top 10

The OWASP Top 10 is one of the most widely used references for the most critical security risks in web applications. It helps you prioritize what to check first, and how to explain risk clearly to developers and stakeholders.

Mental map of OWASP Top 10 (2021) grouped into practical testing clusters like access control, injection, authentication, misconfiguration, and SSRF.
A mental map helps you test systematically: cluster risks into checks you can repeat on every app.

What is OWASP?

The Open Web Application Security Project (OWASP) is a non-profit foundation that produces:

  • The Top 10 (what risks matter most)
  • The WSTG (Web Security Testing Guide — how to test)
  • Tools like ZAP (Zed Attack Proxy)
owasp web security

The OWASP Top 10 (2021 snapshot)

This list evolves, but the categories are stable enough to structure your work:

RankCategoryShort description
A01Broken Access ControlAccess to resources you should not have (IDOR, privilege issues)
A02Cryptographic FailuresSensitive data exposure due to weak/incorrect crypto
A03InjectionUntrusted input changes interpretation (SQL, OS commands, LDAP, ...)
A04Insecure DesignArchitectural design flaws and missing security requirements
A05Security MisconfigurationInsecure defaults, debug enabled, missing headers, ...
A06Vulnerable and Outdated ComponentsKnown CVEs in libraries/frameworks
A07Identification and Authentication FailuresWeak auth/session handling
A08Software and Data Integrity FailuresSupply chain / build integrity issues
A09Security Logging and Monitoring FailuresInsufficient telemetry and alerting
A10Server-Side Request Forgery (SSRF)Server fetches attacker-controlled URLs into internal networks

A practical web testing mindset (lab-first)

The goal is not “try random payloads”. The goal is to build a repeatable testing routine:

Step 1 — Map the surface
- endpoints and routes
- inputs (query params, forms, JSON, cookies, headers)
- auth boundaries (public vs authenticated vs admin)

Step 2 — Understand behavior
- status codes and redirects
- sessions, cookies, and CSRF protections
- error handling and logging

Step 3 — Validate risks safely
- reason about the expected control (what should happen)
- send minimal, safe variations in a local lab
- document evidence and remediation

The golden rule: list all input points

Input pointExamples
Query params`?id=1`, `?page=about`, `?search=test`
POST bodyForms, JSON, XML
Cookies`session=...`, `user_id=...`, `role=...`
HTTP headers`User-Agent`, `Referer`, `X-Forwarded-For`
Path segments`/user/123/profile`, `/api/v1/admin`

Practice environments (recommended)

Use deliberately vulnerable apps in a local lab or official training platforms:

LabTypeReference
DVWADocker / VMgithub.com/digininja/DVWA
WebGoatDocker (OWASP)owasp.org/WebGoat
Juice ShopDocker (OWASP)owasp.org/Juice-Shop
PortSwigger AcademyCloud (free)portswigger.net/web-security

Flashcards

Flashcards
Flashcard

What is the #1 OWASP Top 10 risk (2021) and why does it matter?

Flashcard

OWASP Top 10 vs WSTG: what’s the difference?

Flashcard

Why should you treat every input point as part of your test surface?

Exercises

Exercise 1 — Build a simple “app map” (lab-only)

Pick a training target (DVWA / Juice Shop / PortSwigger labs). In a short report, capture:

  1. 5 important endpoints (login, settings, admin, API, upload)
  2. the inputs each endpoint accepts (params / body / cookies / headers)
  3. the auth boundary (public vs authenticated vs admin)
  4. one “risk hypothesis” per endpoint (what could go wrong?)

Open Questions

Why is mapping (endpoints + inputs) often the most important step of a web test?

Next Lesson

Now that you understand the OWASP Top 10 framework, the next lesson covers Burp Suite—the essential tool for systematic web security testing.

Next: Burp Suite — Essentials

Hands-on challenge

Practice what you learned — run it on your machine.

Do the challenge →

You're on a free lesson

Ready to go further?

Unlock all courses, exercises, real-world scenarios and flashcards — everything to build real skills.

Unlock full access →

No commitment · Cancel anytime

Sign in to track your progress.

Sign in to validate →

11 lessons locked in this course · 800+ students enrolled

$99/year — save 31% vs monthly

Unlock full access →