Learn about GraphQL hacking from the authors who wrote Black Hat GraphQL
1 Day - live online only course
Learn about GraphQL hacking from the authors who wrote Black Hat GraphQL. This crash course into GraphQL will give you a hands-on approach to learning about how this rapidly adopted API technology works and how its internals can be used as attack vectors.
Basics of GraphQL communications, language and type system
Build your own GraphQL hacking lab with a vulnerable target server and popular GraphQL hacking utilities
Understand the basics of GraphQL vulnerabilities
Hands-on GraphQL Learning, from zero to hero
Build your own GraphQL Hacking Lab
In-depth overview of GraphQL’s Language & Type System, and the software ecosystem
High level introduction to common GraphQL weaknesses
Gain foundational knowledge required to execute advanced offensive GraphQL attacks
Basic networking knowledge
Basic web application knowledge
Familiarity with vulnerability classes (OWASP Top 10 and OWASP API Top 10 is a great start!)
Basics of Bash and Python
Patience
Dolev Farhi is the co-author of the No Starch Press book - Black Hat GraphQL and creator of multiple GraphQL hacking tools such as the Damn Vulnerable GraphQL Application (DVGA), graphw00f and GraphQL Cop. Dolev is also the principal security engineer at Wealthsimple, co-founded DEFCON Toronto, and has extensive experience leading security engineering teams in the fintech and cybersecurity industries. In his spare time, he researches vulnerabilities in IoT devices, builds offensive security tools, participates in CTF challenges, and contributes to Exploit-DB.
Nick Aleks is the other co-author of the No Starch Press book - Black Hat GraphQL and is also the creator of two GraphQL hacking utilities, the GraphQL Threat Matrix and CrackQL. Nick is also the senior director of security at Wealthsimple, the other co-founder of DEFCON Toronto, and CEO of ASEC.IO. He’s also a board member at HackStudent and The University of Guelph’s Master of Cybersecurity and Threat Intelligence program. He’s hacked everything from websites to safes, cars, and even smart buildings.
You’ll explore and learn GraphQL through the lens of a hacker
Understand why some of the biggest companies are starting to use GraphQL and how it compares to RESTful APIs
Discover GraphQL’s internals and understand how its language and type system can be manipulated against itself
Establish your own GraphQL hacking lab, complete with a dedicated GraphQL API target to perform your attacks against
Execute your first few GraphQL queries and get comfortable with this new API paradigm.
This training program is for anyone who is interested in learning how to break GraphQL APIs through applied offensive security testing. Whether you’re a penetration tester who has heard of GraphQL and want to develop your hacking expertise, a security analyst looking to improve your knowledge of how to defend GraphQL APIs, or a software engineer planning to build a GraphQL-backed application, you should gain a lot of useful information from this course.
Information security professionals
Bug hunters & Red Teamers
GraphQL Developers
Security Engineers & Analysts
Anyone with interest in understanding GraphQL exploitation
Ethical hackers and penetration testers looking to upgrade their GraphQL exploitation skills
What is GraphQL?
Origin
The GraphQL Specification
GraphQL Communications
The GraphQL Specification
Schema
Root Types
Parsers & Resolvers
GraphQL vs REST API
Hands on GraphQL Queries
Security Precautions
Virtual Environment Setup
Installing GraphQL clients
GUI Clients
CLI Clients
Setting up a Vulnerable GraphQL Server
Deploying & Testing Damn Vulnerable GraphQL Application (DVGA)
Installing GraphQL Hacking Tools
Burp Suite
Clairvoyance
InQL
Graphw00f
BatchQL
Nmap
Commix
graphql-path-enum
EyeWitness
GraphQL Cop
CrackQL
Attack Surface Introduction
The GraphQL Language
Operation Types
Operation Names
Fields
Arguments
Aliases
Fragments
Variables
Directives
GraphQL Data Types
Objects
Scalars
Enums
Unions
Interfaces
Inputs
Introspection
Validation & Execution Phases
GraphQL Weaknesses (Primer for Advance Course)
Specification Rules & Implementation Weaknesses
Denial of Service
Information Disclosure
Authentication & Authorization Bypasses
Injection
Request Forgery & Hijacking
Black Hat GraphQL Book (Signed Copy)
GraphQL Hacking Swag (T-Shirt, Hat, Stickers)
Training Slides
Script and Code Samples
GraphQL Hacking Lab Deployment Instructions
A laptop capable of running a virtual machine (8 GB+ of RAM)
40 GB free hard drive space
Software Requirements
Script and Code Samples
GraphQL Hacking Lab Deployment Instructions
VMware Workstation/Player/Virtualization installed
Everyone should have Administrator privilege on their laptop
Master GraphQL hacking from the authors who wrote Black Hat GraphQL. This (part 2) advanced hacking course builds on top of the foundational knowledge you gained about GraphQL internals in part 1. Leveraging a custom hacking lab, you’ll delve into the details of how to execute numerous GraphQL attacks
Live Online Only
Proactively monitor all of your applications, servers, endpoints and cloud infrastructure by combining automation and expert-driven testing to continuously identify and remediate vulnerabilities.
Request a Demo Learn more