Навыки, которые вы получите:
Linux
SQL
Cyber attacks
Cybersecurity
Necessary preparation
- Basic IT Skills.
- No Linux, programming or hacking knowledge required.
- Computer with a minimum of 4GB ram/memory.
- Operating System: Windows / OS X / Linux.
For those who want to
- Anybody interested in learning website & web application hacking / penetration testing.
- Anybody interested in becoming a bug bounty hunter.
- Anybody interested website hacking.
- Anybody interested in learning how to secure websites & web applications from hacker.
- Web developers so they can create secure web application & secure their existing ones.
- Web admins so they can secure their websites.
The Program
- Course Introduction.
- Preparation -Creating a Penetration Testing Lab.
- Preparation-Linux Basics.
- Website Basics.
- Information Gathering.
- File Upload Vulnerabilities.
- LFI.
- RFI.
- SQL injection Vulnerabilities.
- SQL injection Vulnerabilities-SQLi In Login Pages.
- SQL injection Vulnerabilities-Extracting Data From The Database.
- SQL injection Vulnerabilities-Advanced Exploitation.
- XSS Vulnerabilities.
- XSS Vulnerabilities-Exploitation.
- Insecure Session Management.
- Brute Force & DICTIONARY Attacks.
- Post Exploitation.
- Bonus Section.
What will you learn
- 90+ Videos to take you from a beginner to advanced in website hacking.
- Create a hacking lab & needed software (on Windows, OS X and Linux).
- Become a bug bounty hunters & discover bug bounty bugs.
- Discover, exploit and mitigate a number of dangerous web vulnerabilities.
- Exploit these vulnerabilities to hack into web servers.
- Bypass security & advanced exploitation of these vulnerabilities.
- Advanced post exploitation — hack other websites on the same server, dump the database, privilege escalation…etc.
- Bypass security & filters.
- Intercept requests using a proxy.
- Adopt SQL queries to discover and exploit SQL injections in secure pages.
- Gain full control over target server using SQL injections.
- Discover & exploit blind SQL injections.
- Install Kali Linux — a penetration testing operating system.
- Learn linux commands and how to interact with the terminal.
- Learn linux basics.
- Understand how websites & web applications work.
- Understand how browsers communicate with websites.
- Gather sensitive information about websites.
- Discover servers, technologies & services used on target website.
- Discover emails & sensitive data associated with a specific website.
- Find all subdomains associated with a website.
- Discover unpublished directories & files associated with a target website.
- Find all websites hosted on the same server as the target website.
- Discover, exploit and fix file upload vulnerabilities.
- Exploit advanced file upload vulnerabilities & gain full control over the target website.
- Discover, exploit and fix code execution vulnerabilities.
- Exploit advanced code execution vulnerabilities & gain full control over the target website.
- Discover, exploit & fix local file inclusion vulnerabilities.
- Exploit local file inclusion vulnerabilities to to get a shell.
- Exploit advanced local file inclusion vulnerabilities & gain full control over the target website.
- Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website.
- Discover, fix, and exploit SQL injection vulnerabilities.
- Bypass login forms and login as admin using SQL injections.
- Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections
- Bypass filtering, and login as admin without password using SQL injections.
- Bypass filtering and security measurements.
- Read / Write files to the server using SQL injections.
- Patch SQL injections quickly.
- Learn the right way to write SQL queries to prevent SQL injections.