Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learning Python Web Penetration Testing
Introduction
The Course Overview
Understanding Web Application Penetration Testing Process
Typical Web Application Toolkit
Testing Environment
Interacting with Web Applications
HTTP Protocol Basics
Anatomy of an HTTP Request
Interacting with Web Apps Using Requests Library
Analyzing the Responses
Web Crawling with Scrapy
Web Application Mapping
Creating a Crawler with Scrapy
Recursive Crawling
Extracting Information
Resources Discovery
What Is Resource Discovery?
Building Our First Brute Forcer
Analyzing the Results
Adding More Information
Taking Screenshots of the Findings
Password Testing
How Password Attacks Work?
Our First Password Brute Forcer
Adding Support for Digest Authentication
Form-based Authentication
Detecting and Exploiting SQL Injection Vulnerabilities
SQL Injection Vulnerability
Detecting SQL Injection Issues
Exploiting a SQL Injection to Extract Data
Advanced SQLi Exploiting
Intercepting HTTP Requests
HTTP Proxy Anatomy
Introduction to mitmproxy
Manipulating HTTP Requests
Automating SQLi in mitmproxy
Wrapping Up
Web Application Mapping
You’ll learn about web application mapping, what it is, and how to do it.
Revisit the penetration testing process
Check out the different options of performing the mapping
Check out a mapping example from Burp suite
Complete and Continue