Learn Website Hacking/ Penetration Testing From Scratch
If you want to protect your computer, the best way is to learn how to hack it in the first place! So, security specialists are most commonly the best hackers in the world. So, if you want to become a...
- All levels
- English
Course Description
If you want to protect your computer, the best way is to learn how to hack it in the first place! So, security specialists are most commonly the best hackers in the world. So, if you want to become a world-class security specialist, then becoming a world-class hacker would be the best way to get started.
If you want to protect your computer, the best way is to learn how to hack it in the first place! So, security specialists are most commonly the best hackers in the world. So, if you want to become a world-class security specialist, then becoming a world-class hacker would be the best way to get started.
What you’ll learn
- Information Gathering Gather information and learn about target website Discover about important concepts Go over DNS server, sub-domains, directories, sensitive files, user emails, etc.
- Discovering, Exploiting & Fixing Learn how to discover large vulnerabilities Learn how to exploit them Understand the code causing the vulnerability Learn how to fix them Go over vulnerabilities such as File Upload, File Location Inclusion, Remote File Inclusion, XSS, Insecure Session Management & Brute Force and Dictionary Attacks.
- Post Exploitation What can you do with the access gained from the vulnerabilities Convert reverse shell access to a Weevely access and vice versa How to run system commands on the target server Navigate between directories Access other websites on the same server Upload/download files Access the database Download the whole database to your local machine You will learn how to bypass security
- Discovering, Exploiting & Fixing Learn how to discover large vulnerabilities Learn how to exploit them Understand the code causing the vulnerability Learn how to fix them Go over vulnerabilities such as File Upload, File Location Inclusion, Remote File Inclusion, XSS, Insecure Session Management & Brute Force and Dictionary Attacks.
Covering Topics
Section 1 : Course Introduction
Section 2 : Preparation - Creating a Penetration Testing Lab
Section 3 : Preparation - Linux Basics
Section 4 : Website Basics
Section 5 : Information Gathering
Section 6 : Code Execution Vulnerabilities
Section 7 : Local File Inclusion Vulnerabilities (LFI)
Section 8 : Remote File Inclusion Vulnerabilities (RFI)
Section 9 : SQL Injection Vulnerabilities
Section 10 : SQL Injection Vulnerabilities - SQLi In Login Pages
Section 11 : SQL injection Vulnerabilities - Extracting Data From The Database
Section 12 : SQL injection Vulnerabilities - Advanced Exploitation
Section 13 : XSS Vulnerabilities
Section 14 : XSS Vulnerabilities - Exploitation
Section 15 : Insecure Session Management
Section 16 : Brute Force & Dictionary Attacks
Section 17 : Discovering Vulnerabilities Automatically Using Owasp ZAP
Section 18 : Post Exploitation
Curriculum
Frequently Asked Questions
This course includes
- Lectures 88
- Duration 9 Hour
- Language Select
- Certificate No