HTB
Certified Web Exploitation Expert (CWEE)

Instructor-led training
(12 sessions)
€ 2.400

Are you looking to refine your skills and stay updated with the latest exploitation techniques?

This highly hands-on course will teach you the skills to identify advanced and hard-to-find web vulnerabilities using both black box and white box techniques.

I want to become a HTB Certified Web Exploitation Expert

Fill in the following form and we'll notify you when registration opens.

You want to train your team?

Review code and develop your own exploits!

The course teaches advanced application debugging, source code review, and custom exploit development, preparing students to conduct professional penetration tests on modern and secure web applications. By the end, students will be able to effectively identify, exploit, and report vulnerabilities in application code or logic.

HTB Certified Web Exploitation Expert (HTB CWEE) is a highly hands-on certification that assesses candidates’ skills in identifying advanced and hard-to-find web vulnerabilities using both black box and white box techniques. HTB CWEE certification holders will possess technical competency in the web security, web penetration testing, and secure coding domains at an advanced level and be well-versed in the application debugging, source code review, and custom exploit development aspects of web security testing. They will also be able to professionally conduct web penetration tests against modern and highly secure web applications, as well as report vulnerabilities found in code or arising from logical errors.

The HTB CWEE certification represents the next step in advancing beyond the HTB Certified Bug Bounty Hunter (HTB CBBH) certification.

What You’ll Learn:
✅ Advanced black box web penetration testing
✅ White box penetration testing
✅ Large code base security reviews
✅ Web exploit development
✅ Advanced injections in web applications
✅ Attacking advanced authentication mechanisms
✅ Attacking HTTP/s requests
✅ Performing blind web attacks
✅ Bypassing advanced security filters
✅ Performing deserialization Attacks
✅ Using modern web exploitation techniques

Become an Advanced Web Exploitation Expert and showcase your skills with a highly hands-on training that assesses your skills in identifying advanced web vulnerabilities.

Level:
Entry to
Intermediate

Class schedule:
TBA

Duration:
6 weeks
(8h/week)

Start date:
TBA

Level:
Entry to intermediate

Class schedule:
TBA

Duration:
8 weeks (8h/week)

Start date:
November 18th

Ideal for:

Senior Penetration Testers and
Web Application Penetration Testers

Web Developers (front-end & back-end)
Web Application Security Engineers
Web Source Code Reviewers

Senior Bug Bounty Hunters

Student Pack Includes:

> 1 year access to HTB Academy’s labs and content.

> Instructor available for technical support during the office hours (1h/week).

> Exam voucher includes two (2) exam attempts.

> Course materials such as slides, links to further reading, code snippets, lab exercises, etc.

> HTB Web Exploitation Expert Certification after successfully passing the exam.

HTB Academy Access Includes:

Access to HTB Academy’s content and labs is vital for your participation in this course. A discount voucher will be provided to you upon registration via e-mail, which you can use to activate your subscription to HTB Academy.

Access includes:
> Direct Access to all modules up to (including) TIER II

> Direct Access to the entire Bug bounty Hunter role path

> Step-by-step module solutions

> Unlimited Pwn Box usage

Note: In case you already have a HTB Academy subscription please contact us

Join us now

and boost your career with a world-class certification.

I want to become a HTB Certfied Bug Bounty Hunter

CBBH course includes:
+ Access to HTB Academy

+ 12 instructor-led sessions
+ Exam Voucher

Final Price
€ 1.910

I want to become a HTB Certified Web Exploitation Expert

Fill in the following form and we'll notify you when registration opens.

FAQs:

Accordion Content

The mission of Academy’s SOC Analyst job-role path that leads to HTB Certified Defensive Security Analyst (HTB CDSA) is to teach you, guide you and prepare you for the final exam. Any beginner can start practicing on the related modules and build their knowledge on security analysis, without needing to resort to external resources.

More experienced professionals can also benefit from both the SOC Analyst job-role path and the HTB CDSA exam, as they can help them learn new tricks related to security incident analysis, gain additional hands-on experience, or just reinforce what they already know.

The main focus of this certification is to be realistic, so anyone can automatically apply what they learn in their field, regardless of it being, security analysis, SOC operations, or incident handling.

There are some prerequisites around web, operating system, and networking fundamentals (that you can master through the “SOC Analyst Prerequisites” skill path), but the SOC Analyst job-role path is designed to provide a guided learning experience to deliver the notions required to successfully take the exam and be a certified security analyst!

A certification is not a mandatory prerequisite to become a SOC Analyst or practice any other cybersecurity role, but a great asset if you are looking to learn new skills in a structured way and prove your knowledge to potential employers.

Here is our take as Hack The Box:

  • IT Security certifications do not define an individual, but they verify their skills for a specific job role.
  • A well structured and highly practical training program that results in a certification can greatly flatten the steep learning curve related to cybersecurity topics/domains and also provide you with hands-on experience.
  • A certification from a credible cybersecurity certification vendor could be used to prove to a potential employer that both your skills and professionalism have been successfully put to the test.
  • A certification can be an incentive to remain on track and focussed during your studying.

Hack The Box is a trusted, highly respected, and community-backed IT security training vendor, with a long history in the domain. The training standards of the company are set quite high and this applies to all offerings, machines, challenges, Pro Labs, and now, the certifications.

Through the years, Hack The Box has been a training partner of major organisations, government/military agencies, and academic institutions worldwide. We plan to continue being a trusted training partner, and also provide certification services from now on, while retaining the same level of content-excellence, quality, and integrity.

To prepare effectively for the CBBH program, consider the following recommendations:

  • Familiarity with HTB Academy
  • Setting Up a Lab Environment: Install virtualization software such as VMware or VirtualBox. Set up a few virtual machines, including both Windows and Linux environments, to simulate real-world testing scenarios.
  • Reviewing Networking and Application Fundamentals: If you’re not confident in your fundamentals , it’s advisable to review key concepts such as common protocols, web application stacks, etc.
  • Ensuring Reliable Internet Access: As the course involves online demonstrations and hands-on exercises, a stable and fast internet connection is essential
  • Academy Modules Review:

    1. Review the Introduction to Academy” module

    2. Go through the “Getting Started” module

HTB Certified Web Exploitation Expert (HTB CWEE) is a certification for individuals who want to obtain deep technical competency in the web security, black box/white box web penetration testing, and secure coding domains. While it’s not a strict requirement, it’s strongly advised to have completed the HTB Certified Bug Bounty Hunter (HTB CBBH) certification, or at least to have acquired all the knowledge the “Bug Bounty Hunter” job-role path encompasses. This forms the essential foundation needed to embark on the “Senior Web Penetration Tester” job-role path.

 

The following is a list of prerequisites for a successful outcome:

  • Interpreting a letter of engagement
  • Having advanced knowledge around web penetration testing and secure coding concepts
  • Knowledge around web applications and their functionality
  • Proficiency in comprehending web application code structures and effectively navigating through them.
  • Understanding of complex web vulnerabilities and the ability to detect them, with or without access to the source code.
  • Knowledge of advanced bypasses to circumvent different forms of security measures.
  • Ability to develop exploits to automate the process of exploiting vulnerabilities
  • Ability to patch any identified vulnerabilities and to recommend suitable secure coding advice
  • Professionally communicating and reporting vulnerabilities

Participants have access to a dedicated support team for any technical issues, as well as access to instructors during designated office hours for questions related to the course material. Additionally, you can reach out to your instructor during office hours for personalized assistance.

Unfortunately we don’t record our sessions therefore you’ll need to catch up with the rest of the group. The support team can help you to catch up with the previous sessions and guide you on the materials that you need to read.

To prepare effectively for the CDSA program, consider the following recommendations:

 

  • Tool Proficiency: Experience with SIEM / EDR / tools such as ELK, sysmon.
  • Additional Knowledge: Understanding of how modern threat actors attack organizations, and how this is modeled in the cyber kill chain. The candidate should know common techniques being used in each tactic, along with how security event logs can assist in detecting the execution of these techniques.
  • Access to HTB Academy’s content is vital for your participation in this course. A discount voucher will be provided to you upon registration via e-mail, which you can use to activate your subscription to HTB Academy. The following modules are specifically chosen to provide a strong foundational understanding and skill set, which are critical for your success in the seminar and future endeavors in penetration testing:
    1. Introduction to Academy: This module provides an overview of the Academy platform and guides on how to effectively utilize it for self-training, setting the foundation for your learning journey.
    2. Incident Handling Process: Essential for the defensive part of cybersecurity, this module introduces the overall process of handling security incidents and walks through each stage of the incident handling process.
    3. Learning Process: Focusing on the learning journey, this module covers aspects such as mindset, efficiency, organization, and coping with frustration, crucial for excelling in the information security field.

Find below the facts that differentiate HTB Certified Web Exploitation Expert (HTB CWEE) from standard certifications:

 

  • Continuous Evaluation – To be eligible to start the examination process, one must have completed all modules of the “Senior Web Penetration Tester” job-role path 100% first. Each module in the path comes with its own hands-on skills assessment at the end that students must complete to prove their understanding of the presented topics. The answers to the skills assessment exercises are not provided. Evaluation takes place throughout the journey not only during the examination!
  • Hands-on & Real-world Exam Environment – HTB Certified Web Exploitation Expert (HTB CWEE) candidates will be required to conduct advanced web penetration tests, encompassing both white box and black box approaches on multiple real-world and heterogeneous applications. HTB certifications are not based on and do not include multiple-choice questions!
  • Focus on Advanced & Applicable Skills – The “Senior Web Penetration Tester” job-role path advances the competencies acquired in the “Bug Bounty Hunter” job-role path. It emphasizes the development of sophisticated web exploitation abilities, including white box penetration testing, web application code reviewing, identifying elusive web vulnerabilities, crafting custom exploits, and devising patches for all detected vulnerabilities. This path is enriched with practical demonstrations that encompass a wide range of contemporary web vulnerabilities, thereby sharpening these skills. This comprehensive approach equips candidates with the proficiency needed to discover new, zero-day web vulnerabilities in future scenarios.
  • Outside-the-box Thinking – HTB Certified Web Exploitation Expert (HTB CWEE) candidates will be required to think outside the box and utilize the various skills and techniques they learned throughout the path to achieve the exam’s objectives. Like in real-world engagements, creativity, and in-depth knowledge will be necessary for a successful outcome.
  • Commercial-grade Report Requirement – Successfully completing all required black box and white box web penetration testing activities is not enough to obtain the HTB Certified Web Exploitation Expert (HTB CWEE) certification. As part of their assessment, candidates must not only explain the process of identifying and exploiting vulnerabilities but also develop functional exploits. Additionally, candidates are expected to create patches for the vulnerabilities they uncover. HTB Certified Web Exploitation Expert (HTB CWEE) candidates will have to prove they are market-ready and client-centric professionals.
  • Seamless Experience Powered By Pwnbox – The entire exam and certification process can be conducted through the candidates’ browser, from start to finish. All black box and white box web penetration tests can be performed via the provided and in-browser Pwnbox. There are no infrastructural or tool requirements.

HTB certifications are on Credly! By the time you successfully complete the HTB CDSA exam and claim your certificate, CDSA’s digital badge will arrive on your email. Accept it and share it on your social media, so that third parties can verify your obtained skills!

Syllabus:

Intro to GCP

  • GCP Hierarchy
  • Google Workspace
  • gcloud config
  • Basic Hacking Techniques

Exploitation of GCP Services

  • IAM
  • KMS
  • Secrets 
  • Storage
  • Compute Instances & VPC
  • Cloud Functions
  • CloudSQL
  • Pub/Sub
  • App Engine
  • Google APIs
  • Cloud Shell

Methodologies

  • White box

Security Services

  • GCP Logging & Monitoring

Syllabus:

Intro to AWS

  • AWS Organization
  • AWS Principals
  • Basic Hacking Techniques

Exploitation of AWS Services

  • IAM
  • STS
  • KMS
  • Secrets Manager
  • S3
  • EC2 & VPC
  • Lambda
  • RDS
  • SQS
  • SNS

Methologies

  • White box

Common Detection Mechanisms

  • CloudTrail

Syllabus:

Azure Basics

  • Azure Organization
  • Entra ID
  • Azure Tokens & APIs
  • Basic Enumeration Tools

 

Exploitation of Azure Services

  • Entra ID IAM
  • Azure IAM
  • Azure Applications
  • Azure Key Vault
  • Azure Virtual Machine & Networking
  • Storage Accounts
  • Azure File Share
  • Azure Table Storage
  • Azure SQL Database
  • Azure MySQL & PostgreSQL
  • Azure CosmosDB
  • Azure App Service
  • Basic Azure Research Technique
  • Azure Function Apps
  • Static Web Apps
  • Azure Container Registry
  • Azure Container
  • Instances, Apps & Jobs
  • Azure Queue
  • Azure Service Bus
  • Azure Automation Account
  • Azure Logic Apps
  • Azure Cloud Shell
  • Azure Virtual Desktop

 

Methologies

  • White box
  • Black box
  • Pivoting between Entra ID & AD

 

Common Detection Mechanisms

  • Azure & Entra ID Logging & Monitoring
  • Microsoft Sentinel
  • Microsoft Defender for Cloud & Microsoft Defender EASM

Fundamentals and Setup

  1. Overview of Android’s architecture and ecosystem dynamics.
  2. Exploration of security features native to Android using Java, Kotlin, C++, and Rust.
  3. Mobile Application Threat Model
    a) Differences between mobile and web application threat models.
    b) Applying threat modeling techniques specifically to mobile applications.
    c) Case studies highlighting potential threats and vulnerabilities.
    d) How do we secure and test cross platform apps (e.g. ReactNative, Xamarin, etc).
  4. Introduction to industry mobile security standards
    a) OWASP Mobile Application Security (MAS) project
    b) Effective usage of the Mobile Application Security Verification Standard (MASVS).
    c) Effective usage of the Mobile Security Testing Guide (MSTG).
    d) Overview of the OWASP top 10 for mobile.
  5. Setting up and preparing a mobile security testing lab
    a) Configuration of industry-standard tools and guidance on their appropriate use.
    b) Setup of virtual mobile devices using Corellium, including its advantages.
    c) Introductory exercises to familiarize with the tools.
  6. Secure Coding Overview
    a) Exercises to identify vulnerabilities in code examples
    b) Discussion of the appropriate mechanisms for remediation
    c) Practical session on remediation and re-testing the app
  7. Secure storage
    a) Overview of application storage mechanisms.
    b) Introduction to cryptographic storage solutions on Android.

Advanced Techniques and Practical Application

  • Mobile penetration testing methodology
    a) Methodologies used in real-world scenarios with practical tips and tricks.
  • Identifying issues with backend APIs
    a) Examination of client-side trust issues.
    b) Analysis of insecure communications including certificate validation and pinning.
  • Cryptography in Android apps
    a) Utilization of Android’s Crypto APIs.
    b) Implementation of native cryptography using libraries like libnacl and OpenSSL.
    c) Management of cryptographic keys.
  • Authentication and Authorization
    a) Testing client-side authentication mechanisms, including secure usage of biometrics.
    b) Strategies to detect and bypass authentication flaws.
    c) Security measures for API authentication.
  • Android IPC
    a) Detailed exploration of Intents, deep links, Binders/services, and broadcast receivers.
  • Webviews
    a) Identifying and resolving common security issues in Android Webview configurations.
  • Software Composition Analysis (SBOM)
    a) Techniques to determine the components of an Android app.
    b) Identifying known vulnerabilities within these components.
  • Mobile Device Management (MDM)
    a) Introduction to Mobile Device Management: definition, core features, and its role in enhancing organizational security.
    b) Discussion on the benefits and practical applications of MDM in controlling and securing mobile devices across an enterprise.
  • Mobile Application Management (MAM)
    a) Overview of Mobile Application Management: what it entails and its significance in enterprise environments.
    b) Exploration of how MAM contributes to managing and securing applications specifically, detailing its utility for enterprise security strategies.

Advanced Techniques and Practical Application

  • Mobile penetration testing methodology
    a) Methodologies used in real-world scenarios with practical tips and tricks.
  • Identifying issues with backend APIs
    a) Examination of client-side trust issues.
    b) Analysis of insecure communications including App Transport Security issues & certificate pinning.
  • Cryptography in IOS apps
    a) Utilization of iOS’s CryptoKit & CommonCrypto APIs.
    b) Implementation of native cryptography using libraries like libnacl and OpenSSL.
    c) Management of cryptographic keys and leveraging the secure enclave.
  • Authentication and Authorization
    a) Testing client-side authentication mechanisms, including secure usage of Local Authentication (biometrics).
    b) Strategies to detect and bypass authentication flaws.
    c) Security measures for API authentication.
    d) Using Device Check and App Attest
  • iOS IPC
    a) Detailed exploration of URL schemes, deep (universal) links, and extensions.
  • Webviews
    a) Identifying and resolving common security issues in iOS Webview configurations.
  • Software Composition Analysis (SBOM)
    a) Techniques to determine the components of an iOS app.
    b) Identifying known vulnerabilities within these components.
  • Implementing App Integrity
    a) What to look for
    b) How to implement
  • Mobile Device Management (MDM)
    a) Introduction to Mobile Device Management: definition, core features, and its role in enhancing organizational security.
    b) Discussion on the benefits and practical applications of MDM in controlling and securing mobile devices across an enterprise.
  • Mobile Application Management (MAM)
    a) Overview of Mobile Application Management: what it entails and its significance in enterprise environments.
    b) Exploration of how MAM contributes to managing and securing applications specifically, detailing its utility for enterprise security strategies.

Fundamentals & Setup

  1. Overview of iOS’s architecture and ecosystem dynamics.
  2. Exploration of security features native to to iOS using Objective-C, Swift, and C(++).
  3. Mobile Application Threat Model
    a) Differences between mobile and web application threat models.
    b) Applying threat modeling techniques specifically to mobile applications.
    c) Case studies highlighting potential threats and vulnerabilities.
    d) How do we secure and test cross platform apps (e.g. ReactNative, Xamarin, etc).
  4. Introduction to industry mobile security standards
    a) OWASP Mobile Application Security (MAS) project
    b) Effective usage of the Mobile Application Security Verification Standard (MASVS).
    c) Effective usage of the Mobile Security Testing Guide (MSTG).
    d) Overview of the OWASP top 10 for mobile.
  5. Setting up and preparing a mobile security testing lab
    a) Configuration of industry-standard tools and guidance on their appropriate use.
    b) Setup of virtual mobile devices using Corellium, including its advantages.
    c) Introductory exercises to familiarize with the tools.
  6. Secure Coding Overview
    a) Exercises to identify vulnerabilities in iOS code examples
    b) Discussion of the appropriate mechanisms for remediation
    c) Practical session on remediation and re-testing the app
  7. Secure storage
    a) Overview of application storage mechanisms.
    b) Introduction to cryptographic storage solutions on iOS.