AWAE – Brief Course Review for OSWE

McAiden Research Lab

TitleAWAE – Brief Course Review for OSWE
McAiden Advisory No.MIDA2025-0007
ServiceWeb Application Security
Publish2025-05-21
ByPuwit Yahom

What is AWAE?

Advanced Web Attacks and Exploitation (AWAE) course is a course offers by Offensive Security which aims toward an understanding of web applications penetration testing. The course shows the learner how to analyze the web application from the ground up ,i.e., obtaining source code to pin-pointing the attack surface.

Pricing

For Offsec course in general, the pricing models are divided into 2 types:

  • Annually
    • CyberCore
    • Learn One
  • One-time payment

For author, the bundle was kindly given by McAiden on the “One-time payment” option.

P.S. The Proving Grounds Practice is a platform developed by Offsec which contains many vulnerable machines (with writeups) for the penetration testers to hone their skills.

Course Outline

In summary, the AWAE course will teach a learner on how to obtain, debug, and develop an exploit for a web application. Then, the rest will be a real-world case studies from multiple existing vulnerabilities (CVE) from the source code analysis, vulnerability reproduction, and developing a script. The shown case studies also developed different framework (e.g., .NET, Java, PHP) to allow the learner to know how to perform an analysis on each one of them.

Exam

The exam contains 2 target machines with its identical pair (for debugging). Each target contains 2 flags: local.txt and proof.txt.

Main objectives of the exam:

  • Bypass Authentication to gain access to Admin page (and obtain the local.txt on the admin page)
  • Perform Remote Code Execution to read proof.txt on the server
  • Develop a single exploit script that extract local.txt content and/or proof.txt

The passing criteria itself does not require the tester to obtain a reverse shell and does not need to obtain root access.

Exam period

The exam period is 2 whole days (47 hours and 45 minutes) with 1 additional day for reporting.

Exam Report

OffSec has a template report for OSWE. It is recommended to follow all the shown sections in the template report since it will be enough to pass OffSec criteria. It is highly recommended to explain every detail thoroughly. From the methodology of finding a vulnerability to a exploitation steps. In the author case, the report includes both the steps of finding a vulnerable components (analyzing the source code) and proof of concept steps (exploiting the target and writing part of script). Then, provide a full script as required.

Exam announcement

For the author, the report is sent on Monday and the announcement email is sent back on Tuesday (around 24 hours).

Personal Recommendations

In the author opinion, the exam itself is not as difficult as the OSCP since the testers will be given everything one needs (the whole source code) to exploit a web. The thought process for the author is:

  • What pages can be accessed?
  • Perform a reverse analysis from admin page to unauthorized access
  • SQL statements
  • Deserialization function

OSWE Certification

After all the hardships, the testers will obtain a OffSec Web Expert (OSWE) Certificate to prove that the testers acquired sufficient skills for web penetration testing. https://credentials.offsec.com/15be4ee4-3c76-45d7-82f2-b776e60cd6df