<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: ngbonzini</title>
    <description>The latest articles on DEV Community by ngbonzini (@ngbonzini).</description>
    <link>https://dev.to/ngbonzini</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F508944%2Fc31f8072-02e3-4f43-81ee-62366ba13f4d.jpg</url>
      <title>DEV Community: ngbonzini</title>
      <link>https://dev.to/ngbonzini</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ngbonzini"/>
    <language>en</language>
    <item>
      <title>Fast Dive into eWPTv2</title>
      <dc:creator>ngbonzini</dc:creator>
      <pubDate>Tue, 30 Jan 2024 18:23:51 +0000</pubDate>
      <link>https://dev.to/ngbonzini/fast-dive-into-ewptv2-1k7i</link>
      <guid>https://dev.to/ngbonzini/fast-dive-into-ewptv2-1k7i</guid>
      <description>&lt;p&gt;Hello community! 👋 Today, i'm excited to share my experience diving into web application security through the eWPTv2 (Web Application Penetration Tester) certification. Let's dive into the journey and explore valuable resources.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Facq0vr2esp3u0hihda3o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Facq0vr2esp3u0hihda3o.png" alt="Badge" width="400" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  ¿Whats is eWPTv2?
&lt;/h4&gt;

&lt;p&gt;According to &lt;a href="https://security.ine.com/certifications/ewpt-certification/"&gt;&lt;strong&gt;INE&lt;/strong&gt;&lt;/a&gt; ,"eWPTv2 is a hands-on, professional-level Red Team certification that simulates skills utilized during real-world engagements." The exam lasts 10 hours, featuring 50 questions. You don't have to submit a report; just answer the questions.&lt;/p&gt;




&lt;h4&gt;
  
  
  The course
&lt;/h4&gt;

&lt;p&gt;It's a meticulously crafted curriculum covering a broad spectrum of web application security topics. From identifying vulnerabilities to conducting penetration tests, eWPTv2 ensures a comprehensive but not overly advanced knowledge. I highly recommend taking the course led by Alexis Ahmed before attempting the exam. This course provides the necessary tools not only to pass the certification but also to perform penetration testing at a professional level or to venture into the world of Bug Bounty.&lt;/p&gt;

&lt;p&gt;The topics covered include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;An introduction to Web Application Security testing, covering everything from the HTTP protocol to &lt;a href="https://owasp.org/Top10/"&gt;OWASP Top&lt;/a&gt; Ten and its &lt;a href="https://github.com/OWASP/wstg/tree/master/checklists"&gt;Open Web Security Testing Guide&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Web Enumeration and Information gathering.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://portswigger.net/burp"&gt;Burpsuite&lt;/a&gt; and &lt;a href="https://www.zaproxy.org/"&gt;OWASP ZAP&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;XSS&lt;/li&gt;
&lt;li&gt;SQLinjection&lt;/li&gt;
&lt;li&gt;Broken Authentication&lt;/li&gt;
&lt;li&gt;Session Security&lt;/li&gt;
&lt;li&gt;Cross-Site Request Forgery&lt;/li&gt;
&lt;li&gt;Command Injection&lt;/li&gt;
&lt;li&gt;Arbitrary File Upload Vulnerabilities&lt;/li&gt;
&lt;li&gt;Path Traversal&lt;/li&gt;
&lt;li&gt;LFI / RFI&lt;/li&gt;
&lt;li&gt;Web Services&lt;/li&gt;
&lt;li&gt;Security Testing CMS&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  Resources
&lt;/h3&gt;

&lt;p&gt;If you prefer free resources or those from other platforms for additional learning and practice, here's a list of resources I used for extra preparation:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;From Hack The Box&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.hackthebox.com/machines/backend"&gt;Backend&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hackthebox.com/machines/jerry"&gt;Jerry&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hackthebox.com/machines/curling"&gt;Curling&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hackthebox.com/machines/opensource"&gt;OpenSource&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hackthebox.com/machines/secnotes"&gt;SecNotes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hackthebox.com/machines/mentor"&gt;Mentor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hackthebox.com/machines/apocalyst"&gt;Apocalyst&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;From Vulnhub&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.vulnhub.com/entry/dc-32,312/"&gt;DC_3&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Open Source&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://tryhackme.com/room/owaspmutillidae"&gt;OWASP Mutillidae II&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.itsecgames.com/index.htm"&gt;bWAPP (Buggy Web Application)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/appsecco/dvna"&gt;Damn Vulnerable NodeJS Application&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/valtterikodisto/vulnerable-bank"&gt;Vulnerable Bank&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;For Learning&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://academy.hackthebox.com/path/preview/bug-bounty-hunter"&gt;Bug Boutny Hunter from HTB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portswigger.net/web-security"&gt;PortSwigger&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hackerone.com/hackers/hacker101"&gt;HackerOne&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ready to fortify your skills and unlock new possibilities in web security? Dive into the world of eWPTv2 and let's secure the future together! 💻🔒&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp2drg9vrc6l7850rydk2.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp2drg9vrc6l7850rydk2.jpg" alt="Certification" width="800" height="618"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>development</category>
      <category>cybersecurity</category>
      <category>web</category>
    </item>
  </channel>
</rss>
