Library

Course: Ethical Hacking:Beginner Guide To Web Application Pentesting

Ethical Hacking:Beginner Guide To Web Application Pentesting

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
  • Self-Paced
About this Course

Welcome to the basics of web application hacking where you will learn how to look for security flaws in web applications and how to execute them.

We will cover the basics that any beginner should have, you will not have to write any code during this course and I created this course keeping in my mind that my students won't have any prior knowledge.

You will learn lots:

  • You will learn how to setup your lab
  • You will get comfortable with Kali Linux
  • You will find and execute exploits related to web application vulnerabilities

That's only the tip of the iceberg, there's still much more to come.

This course is made for anyone looking to start educating themselves in web application security and start their career in this field, Web Developers will also understand how these attacks happen and will help improve their security.

Basic knowledge
  • Basic Computer Knowledge
  • No Programming Language Required
  • +4 GB of Ram Size
  • A Desire To Learn New Stuff
What you will learn
  • Discover vulnerabilities & exploit them
  • Learn The Basic Steps You Should Take When Performing a Web Application Pentest
  • Discover and Exploit XSS
  • Learn SQL INJECTION
  • Learn SQL Queries
  • Learn The Causes of These Vulnerabilites
  • Learn How To Prepare Your Lab Environment For Testing
  • Detect The Web Application a Website Is Using and Find The Vulnerabilities Related
Curriculum
Number of Lectures: 21
Total Duration: 01:25:17
Introduction
  • Introduction  
Course Briefing
  • HTTP Requests and Web Server  
  • Web Application and Vulnerability Definition  
Setting up your lab
Getting comfortable with Kali Linux
  • Apache Web Server  
  • SSH Service  
  • Directory and File commands  
  • Searching for Files and Folder  
Practical Exploitation
  • Local File Include  
  • Remote File Include  
  • Login Bruteforce  
  • Arbitrary File Upload  
  • Netcat  
  • Cross-Site Scripting  
  • SQL INJECTION PART 1: SQL QUERIES  
  • SQL INJECTION PART 2: SQL INJECTION  
  • SQL INJECTION PART 3: VVM  
  • Cross-Site Request Forgery (CSRF)  
Reviews (0)