z Security, Zaid Sabih
Udemy
Глобальный
Курс
Online
В любой момент
10,5 hours
Стоимость курса
109,99 USD
Подробности и регистрация

Website Hacking / Penetration Testing & Bug Bounty Hunting

Лидер продаж на Udemy
Навыки, которые вы получите:
Linux SQL Cyber attacks Cybersecurity

Necessary preparation

  • Basic IT Skills.
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory.
  • Operating System: Windows / OS X / Linux.

For those who want to

  • Anybody interested in learning website & web application hacking / penetration testing.
  • Anybody interested in becoming a bug bounty hunter.
  • Anybody interested website hacking.
  • Anybody interested in learning how to secure websites & web applications from hacker.
  • Web developers so they can create secure web application & secure their existing ones.
  • Web admins so they can secure their websites.

The Program 

  1. Course Introduction.
  2. Preparation -Creating a Penetration Testing Lab.
  3. Preparation-Linux Basics.
  4. Website Basics.
  5. Information Gathering.
  6. File Upload Vulnerabilities.
  7. LFI.
  8. RFI.
  9. SQL injection Vulnerabilities.
  10.  SQL injection Vulnerabilities-SQLi In Login Pages.
  11.  SQL injection Vulnerabilities-Extracting Data  From The Database.
  12.  SQL injection Vulnerabilities-Advanced Exploitation.
  13. XSS Vulnerabilities.
  14. XSS Vulnerabilities-Exploitation.
  15. Insecure Session Management.
  16. Brute Force & DICTIONARY Attacks.
  17. Post Exploitation.
  18. Bonus Section.

What will you learn

  • 90+ Videos to take you from a beginner to advanced in website hacking.
  • Create a hacking lab & needed software (on Windows, OS X and Linux).
  • Become a bug bounty hunters & discover bug bounty bugs.
  • Discover, exploit and mitigate a number of dangerous web vulnerabilities.
  • Exploit these vulnerabilities to hack into web servers.
  • Bypass security & advanced exploitation of these vulnerabilities.
  • Advanced post exploitation — hack other websites on the same server, dump the database, privilege escalation…etc.
  • Bypass security & filters.
  • Intercept requests using a proxy.
  • Adopt SQL queries to discover and exploit SQL injections in secure pages.
  • Gain full control over target server using SQL injections.
  • Discover & exploit blind SQL injections.
  • Install Kali Linux — a penetration testing operating system.
  • Learn linux commands and how to interact with the terminal.
  • Learn linux basics.
  • Understand how websites & web applications work.
  • Understand how browsers communicate with websites.
  • Gather sensitive information about websites.
  • Discover servers, technologies & services used on target website.
  • Discover emails & sensitive data associated with a specific website.
  • Find all subdomains associated with a website.
  • Discover unpublished directories & files associated with a target website.
  • Find all websites hosted on the same server as the target website.
  • Discover, exploit and fix file upload vulnerabilities.
  • Exploit advanced file upload vulnerabilities & gain full control over the target website.
  • Discover, exploit and fix code execution vulnerabilities.
  • Exploit advanced code execution vulnerabilities & gain full control over the target website.
  • Discover, exploit & fix local file inclusion vulnerabilities.
  • Exploit local file inclusion vulnerabilities to to get a shell.
  • Exploit advanced local file inclusion vulnerabilities & gain full control over the target website.
  • Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website.
  • Discover, fix, and exploit SQL injection vulnerabilities.
  • Bypass login forms and login as admin using SQL injections.
  • Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections
  • Bypass filtering, and login as admin without password using SQL injections.
  • Bypass filtering and security measurements.
  • Read / Write files to the server using SQL injections.
  • Patch SQL injections quickly.
  • Learn the right way to write SQL queries to prevent SQL injections.
Нам нужен ваш фидбек!
Честный и беспристрастный