Web Applications Hacking Penetration Testing
Tags: Penetration Testing
Practice Web Applications Hacking & Penetration Testing against a number of real world web applications/websites.
Last updated 2022-01-10 | 3.4
- Set Up a Lab Environment To Practice Hacking and Penetration Testing.- Understand How Websites / web applications Work.
- Detect What Technologies / Scripts A Website Is Using.
What you'll learn
Set Up a Lab Environment To Practice Hacking and Penetration Testing.
Understand How Websites / web applications Work.
Detect What Technologies / Scripts A Website Is Using.
Intercepting HTTP Requests Using A Personal Proxy.
Collect Sensitive Information About The Target.
Web Applications Hacking / Websites Hacking.
TOP 10 Web Applications / Websites Vulnerabilities and Website Related Hacking Techniques.
Discover and Exploit Cross Site Scripting (XSS) Vulnerabilities.
Detect and Exploit Cross Site Request Forgery (CSRF) Vulnerabilities.
Discover and Exploit Command Execution Vulnerabilities.
Uncover and Exploit SQL Injection Vulnerabilities.
Uncover and Exploit Script Source Code Disclosure Vulnerabilities.
Using Burp Suite Proxy.
How To Use Vega (Web App / website Vulnerability Scanner) to Scan Websites.
How To Use Arachni (Web Vulnerability Scanner) to Scan Websites.
Answers to all of your questions about ethical hacking and penetration testing!
Get A Job As A Penetration Tester / Ethical Hacker & Make Money Online As A Freelancer.
The Ability To Hack And Pen Test Any Website / web application.
Learn About The different fields of Web Applications Hacking.
* Requirements
* Basic Information Technology Skills.* A Desire To Learn.
* Basic Knowledge Of Web Applications (not mandatory).
* Hacking Operating Systems: KALI LINUX
* PARROT SECURITY OS
* BACKBOX LINUX...etc
* No previous hacking knowledge required.
Description
- Set Up a Lab Environment To Practice Hacking and Penetration Testing.
- Understand How Websites / web applications Work.
- Detect What Technologies / Scripts A Website Is Using.
- Intercepting HTTP Requests Using A Personal Proxy.
- Collect Sensitive Information About The Target.
- Web Applications Hacking / Websites Hacking.
- TOP 10 Web Applications / Websites Vulnerabilities and Website Related Hacking Techniques.
- Discover and Exploit Cross Site Scripting (XSS) Vulnerabilities.
- Detect and Exploit Cross Site Request Forgery (CSRF) Vulnerabilities.
- Discover and Exploit Command Execution Vulnerabilities.
- Uncover and Exploit SQL Injection Vulnerabilities.
- Uncover and Exploit Script Source Code Disclosure Vulnerabilities.
- Using Burp Suite Proxy.
- How To Use Vega (Web App / website Vulnerability Scanner) to Scan Websites.
- How To Use Arachni (Web Vulnerability Scanner) to Scan Websites.
- Answers to all of your questions about ethical hacking and penetration testing!
- Get A Job As A Penetration Tester / Ethical Hacker & Make Money Online As A Freelancer.
- The Ability To Hack And Pen Test Any Website / web application.
- Learn About The different fields of Web Applications Hacking.
Course content
13 sections • 44 lectures
Welcome To the Web Applications Hacking and Penetration Testing Course Preview 00:46
Web applications hacking intro
How I Hacked The Payment System of Origin Energy (Australian Company) Preview 01:35
A critical XSS vulnerability has been discovered by me in a well-known company in Australia. The flaw allowed me to hack their payment system.
Facebook Bug- Facebook Users (Denial of Use) Attack Preview 01:17
How Websites work? Preview 02:25
How web applications work