Got a question? Call +632 8244 2098   |   
Cyber Security Category

WEB-300 - Advanced Web Attacks and Exploitation (OSWE) - Self-paced

  • Length self-paced / 90 days access
  • Inclusions WEB-300 course + 90-days lab access + OSWE exam
Course overview
Book now

Why study this course

Specialise in web application security with our updated version of WEB-300. From XSS attacks to advanced SQL injections and server side request forgery, learn how to exploit and secure web apps using white box pentesting methods.  

This challenging certification program will develop their skills in a white box and black box environment, with insight and instruction from top cybersecurity leaders. Students who complete the course and pass the exam earn the Offensive Security Web Expert (OSWE) certification, demonstrating mastery in exploiting front-facing web apps. 

The OSWE is one of three certifications making up the new OSCE3 certification, along with the OSEP for advanced pentesting and the OSED for exploit development. 

This self paced course includes: 

  • 10-hour video series 

  • PDF course guide (410+ pages) 

  • Private labs 

  • Active student forums 

  • Access to virtual lab environment 

Introducing Advanced Web Attacks and Exploitation

About the exam: 

  • The WEB-300 course and online lab prepares you for the OSWE certification 

  • 48-hour exam 

  • Proctored

Learn more about the exam 

Request Course Information

By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.

What you’ll learn

  • Performing advanced web app source code auditing 

  • Analysing code, writing scripts, and exploiting web vulnerabilities 

  • Implementing multi-step, chained attacks using multiple vulnerabilities 

  • Using creative and lateral thinking to determine innovative ways of exploiting web vulnerabilities 

Offensive Security at DDLS

Security professionals from top organisations rely on Offensive Security to train and certify their personnel. DDLS is an Official Training Partner for Offensive Security.

Stay ahead of the technology curve

Don’t let your tech outpace the skills of your people

Quality instructors and content

Expert instructors with real world experience and the latest vendor- approved in-depth course content.

Partner-Preferred Supplier

Chosen and awarded by the world’s leading vendors as preferred training partner.

Ahead of the technology curve

No matter your chosen technologies or platforms, we can help you stay one step ahead.

Who is the course for?

  • Experienced penetration testers who want to better understand white box web app pentesting 

  • Web application security specialists 

  • Web professionals working with the codebase and security infrastructure of a web application 

Course subjects

WEB-300 focuses on white box web app pentest methods. The bulk of your time will be spent analysing source code, decompiling Java, debugging DLLs, manipulating requests, and more, using tools like Burp Suite, dnSpy, JD-GUI, Visual Studio, and the trusty text editor. View the full syllabus here

The course covers the following topics:

  • Cross-Origin Resource Sharing (CORS) with CSRF and RCE 

  • JavaScript Prototype Pollution 

  • Advanced Server Side Request Forgery 

  • Web security tools and methodologies 

  • Source code analysis 

  • Persistent cross-site scripting 

  • Session hijacking 

  • .NET deserialisation 

  • Remote code execution 

  • Blind SQL injections 

  • Data exfiltration 

  • Bypassing file upload restrictions and file extension filters 

  • PHP type juggling with loose comparisons 

  • PostgreSQL Extension and User Defined Functions 

  • Bypassing REGEX restrictions 

  • Magic hashes 

  • Bypassing character restrictions 

  • UDF reverse shells 

  • PostgreSQL large objects 

  • DOM-based cross site scripting (black box) 

  • Server side template injection 

  • Weak random token generation 

  • XML external entity injection 

  • RCE via database functions 

  • OS command injection via WebSockets (black box) 


  • Comfort reading and writing at least one coding language 

  • Familiarity with Linux 

  • Ability to write simple Python / Perl / PHP / Bash scripts 

  • Experience with web proxies 

  • General understanding of web app attack vectors, theory, and practice 


DDLS offers training in cybersecurity through our partnership with Offensive Security. This arrangement requires DDLS to provide your details to Offensive Security for registration purposes.

Terms & Conditions

The supply of this course by DDLS is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.

Request Course Information

By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.