Unec 1749060905
Unec 1749060905
(sillabus)
I. Information about the subject
Item Code: - 01001
Type of item: required
Year of study: 2025/2026
Semesters of study of the subject: spring
Faculty: Digital Economics
Group: 585-I
Academic load: 60 hours (lectures / seminar/ - 30/30/)
Forms of study: full-time, part-time
Number of credits: 5
Department: Digital Communication and Applied Informatics
II. Information about the teacher
Teacher (UNEC): Aaflatun Mammadov
E-mail: aflatunmasimoglu@gmail.com, aflatun_mammadov@unec.edu.az
Work phone: 012 478 37 37; mobile phone: 050 288 39 39;
III. Description of the item
The chronology of the Internet development, its advantages and disadvantages
are considered. The main organizational units coordinating the work on
standardization of the Internet are presented. The description and operation of
the TCP/IP protocol stack, as well as the addresses used to identify network
interfaces, are provided. The structure and principles of WWW and application-
level Internet protocols are described in detail.
It provides general information, a description, and recommendations for
preventing the main vulnerability models according to the OWASP classification.
Special attention is paid to one of the most popular and widely advertised types
of attack, distributed denial of service (DDoS).
At the same time, various types of attacks on web systems are considered in
detail: cross-site scripting (XSS), SQL injections, password brute force,
unprotected resources.
The key stages of providing remote access via SSH protocol, which is used for
remote management of user data on the server, running service commands,
working in console mode with databases, as well as for creating tunnels - a
secure logical connection between two network nodes, are considered.
The safe installation and configuration of an FTP server for Windows operating
systems is considered, which provides users with the ability to connect and
perform various actions with files and folders stored on the server: download,
upload, create, edit, rename, delete, assign access rights.
The subject of a separate study is the rules for protecting modern web
applications and ensuring the security of the application architecture. An
effective way to determine the sequence of code verification for security holes
and search for vulnerabilities related to logical errors is analyzed.
The methods and processes of protection against XSS attacks, DoS attacks, CSRF
and XXE attacks are considered in detail.
The SQL string is escaped inside the HTTP request, which makes it possible to
execute the desired SQL query on behalf of the user. To implement the code, you
need to understand how the application functions, since it is usually carried out
as a result of executing server code, in which the text extracted by the analyzer
from the client HTTP request is added.
The first measure against DoS-type attacks should be to create a comprehensive
registration system on the server. All requests should be recorded along with the
amount of time it took to respond. In addition, you should manually log the
performance of any type of asynchronous jobs, such as backups that are called
through the API, but run in the background, and no response is generated after
it is completed. This will allow you to detect any (accidental or malicious)
attempts to exploit a vulnerability to DoS attacks.
The software tools and basic tools for analyzing the security of Web applications
and for ensuring the security of a web server are analyzed in detail. Web
application security verification includes an active analysis of the application for
any kind of weaknesses, technical flaws or vulnerabilities.
IV. The purpose and objectives of the subject
The main purpose of the course is to familiarize students with information
related to penetration testing, error detection and any other security work at
the Web application level.
It is also necessary to teach students how to use knowledge when searching for
vulnerabilities, developing methods of exploiting them, prioritizing
compromised data and providing means to protect them. To study in depth the
options for exploiting vulnerabilities both at the code level and at the
architecture level. For students to effectively perceive the course "Penetration
Testing", there is enough knowledge at the level of the secondary general
education course in computer science and the course "Computer Technology
and Programming".
This course also introduces the latest achievements in the field of Web
application security and attacks, counteraction measures for the selection and
application of proprietary scripts, network requests and tools that are included
in the standard package of operating systems, as well as standard tools built into
the main web browsers (Chrome, Firefox and Edge).
V. Methodology teaching the subject
They are used in a wide aspect of teaching and training, lecturing in the learning
process, organizing interactive discussions, executing projects in a team form,
working in small groups, business games, analyzing and studying specific
samples and teaching methods (case study), presenting free topics and
completing test tasks.
They should be able to search for the necessary data, organize, process, analyze
and evaluate it, as well as disseminate information in accordance with their
goals. This ability should provide students with the opportunity to:
• successfully pursue lifelong education (including receiving educational services
using the Internet);
• prepare for the chosen professional activity;
• to live and work in an information society, in a knowledge-based economy.
Special attention will be paid to new teaching methods:
• Internet technologies - communication by means of e–mail and the Virtual
University system
• information technology – direct use of a computer, electronic materials
• Information and communication technologies – presentations, interactive
tests, video tutorials.
VI. Learning outcomes
After completing the course of study and mastering all the topics, students
They should know:
• Know the technical devices and structures of the web application, as well as
the services that support its operation. How are the client and server parts of
applications related to each other, and understand their architecture well. The
behavior of the application on the server, on the client side, and on the network.
Which technologies ensure the functioning of applications at each of these three
levels. To see weaknesses in various databases, client technologies and network
protocols.
• Be able to identify weaknesses in the application architecture at the stage of
preliminary data collection. When searching for vulnerabilities, focus primarily
on poorly designed functionality. Functionality equipped with good protective
mechanisms remains more resistant to attempts to bypass filtration systems.
• At the stage of preliminary data collection for the purpose of mapping an
application, it is necessary to take into account the overall architecture of its
security system. Architecture analysis will not only show the direction of
vulnerability search, but will also be able to help identify weaknesses in future
functionality.
• Cross-site scripting (XSS), their types and manifestations. XSS vulnerability
detection. The use of advanced code writing techniques to prevent cross-site
scripting and the centralized function of adding data to the DOM so that cleanup
is a standard operation performed for the entire application. Take into account
common receivers for DOM XSS, and if they are not required, clear or block
them.
• Cross-Site Request Forgery (CSRF) procedure how is the trust relationship
between the browser, the user and the web server/API and the form of its
manifestation. Methods to protect against cross-site request forgery and
eliminate or reduce the risk of CRSF in a web application that are implemented
at the design or code writing stage.
• Attack on external XML entities (XXE attack). XXE attacks are possible due to
the existence of an insufficiently protected standard. Forms of protection against
XXE attacks.
• Countering the introduction of SQL code. Timely detection of vulnerabilities
and taking protective measures reduce the likelihood that your web application
will be attacked with SQL injection. The main SQL databases offer measures to
prevent code injection, but low–quality application architecture and incorrectly
written client-server interaction code still leave room for this vulnerability.
Building a code base in accordance with the principle of minimum privileges will
help the application minimize damage in the event of a hack. An application
designed with security requirements in mind will never allow the client (user) to
provide a request or command to be executed on the server.
• One of the most popular and widely advertised types of attack is distributed
denial of service (DDoS). This is a type of denial of service (DoS) in which a large
network of devices floods the server with requests, slowing down its operation
and interfering with legitimate users. The probability of a DoS attack can be
reduced due to a well-designed application architecture that does not allow
users to seize resources for a long time. ReDoS-type attacks related to malicious
regular expressions can be mitigated by configuring a static analysis tool (for
example, linter) to scan regular expressions in the codebase and warn if
syntactically they look like "evil".
• Protection of third-party dependencies in web applications. By applying the
principle of minimum privileges, you can allow certain dependencies to run on
their own server, or at least in their own environment with isolated server
resources. This reduces the risk of compromising the rest of the application if a
serious security hole is discovered or if an undetected malicious script is
triggered.
Must be able to:
• Use a combination of methods to increase the chances of detecting and
eliminating serious security vulnerabilities before they are discovered and
exploited by hackers.
• Identify different ways to search for vulnerabilities in the code base of web
applications, their manifestations and ensuring the security of computer
systems.
• Identify weaknesses in the application architecture at the stage of preliminary
data collection.
• To see weaknesses in various databases, client technologies and network
protocols.
VII. Prerequisites
A preliminary study of the course "Computer Technology and Programming" is
required.
Prerequisites
There is no need for related items.
15. Security Best Security best practices and remediation "Penetration Testing:
Practices and strategies focus on strengthening systems A Hands-On
Remediation against attacks by addressing identified Introduction to
Strategies vulnerabilities. This includes applying Hacking" by Georgia
patches, updating software, using strong Weidman (Chapter
authentication methods, encrypting 10)
sensitive data, and educating employees.
"The Web
Remediation strategies involve promptly
Application Hacker's
fixing issues discovered during
Handbook" by
penetration testing to prevent future
Dafydd Stuttard &
exploitation and ensure a robust security
Marcus Pinto
posture.
(Chapter 14)
OWASP Testing
Guide (Section 12)
PTES (Section 12)
Final exam
Imtahan sualları:
“Nüfuzetmə sınaqlarının əsasları”
What are the key differences between the OWASP, PTES, and
NIST penetration testing methodologies? Explain how each
11 03
methodology approaches penetration testing and their
respective advantages.