Course Overview

Advanced Web Attacks and Exploitation (AWAE) is an advanced web application security review course. We teach the skills needed to conduct white box web app penetration tests.



  • Material
    • XML external entity injection
    • Weak random token generation
    • DOM XSS
    • Server side template injection
    • Command injection via websockets (black box material)
  • Labs: Three new private exercise machines with custom web apps
  • Updated control panel

In AWAE, students will learn how to:

  • Perform a deep analysis on decompiled web app source code
  • Identify logical vulnerabilities that many enterprise scanners are unable to detect
  • Combine logical vulnerabilities to create a proof of concept on a web app
  • Exploit vulnerabilities by chaining them into complex attacks

This course can be taken as an option for skills specialization after completing PWK, but students should be comfortable reading and writing code in at least one language.

Students who complete the course and pass the exam earn the Offensive Security Web Expert (OSWE) certification, demonstrating mastery in exploiting front-facing web apps.

Find out more: Certification Process | Course Details (who should take the course, syllabus, prerequisites) | Course Pricing


Course includes a 48-hour exam.


Learn web application attacks and exploits.


Gain access to a virtual penetration testing lab.

Offensive Security Web Expert (OSWE)

Earn your OSWE certification.

Certification Process

OSWE is an advanced web application security certification. We recommend starting with PWK and earning the OSCP penetration testing certification first.

Once you’ve completed the AWAE course material and practiced your skills in the labs, you’re ready to take the certification exam.

The OSWE exam has a time limit of 48 hours and consists of a hands-on web application assessment in our isolated VPN network. Within the exam environment, you’ll attack various web applications and operating systems. Points are awarded for each compromised application, based on their difficulty and the level of access obtained.

If you obtain the points needed to pass, you must submit a comprehensive web application assessment report. It should contain in-depth notes and screenshots detailing your findings. This exam is proctored.

Real-world Benefits

A passing exam grade will declare you an Offensive Security Web Expert (OSWE). Certified OSWEs have a clear and practical understanding of the web application assessment and hacking process. They’ve proven their ability to review advanced source code in web apps, identify vulnerabilities, and exploit them.


Register at least 10 days prior to desired start date.


Establish connection to the virtual lab.


Progress through course materials and practice your skills.


Schedule certification exam within 120 days of course completion.

Offensive Security Web Expert (OSWE)

Successfully complete the 48-hour exam and earn your OSWE.

Course Details


Advanced Web Attacks and Exploitation is not an entry-level course. AWAE is designed for:

  • Experienced penetration testers who want to better understand white box web app pentesting
  • Web application security specialists
  • Web professionals working with the codebase and security infrastructure of a web application
    (software engineer, full stack web developer, etc)



AWAE is not a course focused on black box methodology. You will be learning white box web app pentest methods. The bulk of your time will be spent analyzing source code, decompiling Java, debugging DLLs, manipulating requests, and more, using tools like Burp Suite, dnSpy, JD-GUI, Visual Studio, and the trusty text editor. The course covers the following topics in detail. For a more complete breakdown of the course topics, please refer to the AWAE syllabus.

  • Web security tools and methodologies
  • Source code analysis
  • Persistent cross-site scripting
  • Session hijacking
  • .NET deserialization
  • Remote code execution
  • Blind SQL injections
  • Data exfiltration
  • Bypassing file upload restrictions and file extension filters
  • PHP type juggling with loose comparisons
  • PostgreSQL Extension and User Defined Functions
  • Bypassing REGEX restrictions
  • Magic hashes
  • Bypassing character restrictions
  • UDF reverse shells
  • PostgreSQL large objects
  • DOM-based cross site scripting (black box)
  • Server side template injection
  • Weak random token generation
  • XML external entity injection
  • RCE via database functions
  • OS command injection via WebSockets (black box)

Advanced Web Attacks and Exploitation expects students have the following before starting the course:

  • Comfort reading and writing at least one coding language (Java, .NET, JavaScript, Python, etc)
  • Familiarity with Linux: file permissions, navigation, editing, and running scripts
  • Ability to write simple Python / Perl / PHP / Bash scripts
  • Experience with web proxies, such as Burp Suite and similar tools
  • General understanding of web app attack vectors, theory, and practice


  • Performing advanced web app source code auditing
  • Analyzing code, writing scripts, and exploiting web vulnerabilities
  • Implementing multi-step, chained attacks using multiple vulnerabilities
  • Using creative and lateral thinking to determine innovative ways of exploiting web vulnerabilities


  • 10-hour video series
  • PDF course guide (410+ pages)
  • Private labs
  • Active student forums
  • Access to virtual lab environment


Course Reviews

The AWAE/OSWE Journey: A Review


All prices in US dollars. Register for AWAE.

Current students as of July 14, 2020 upgrade free. Students whose lab time ended July 7-21 are eligible to update for free using their purchase link.

Are You Ready?

Register for AWAE