Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Website Hacking & Penetration Testing - Hands On!
Introduction to Ethical Hacking and Penetration Testing
Why Website Hacking & Penetration Testing is important? (1:27)
Career Opportunity (4:57)
Teacher Introduction (1:03)
What Shall You Expect From the Course (2:14)
Setup the Environment
Install XAMPP (6:05)
Troubleshoot Apache Faliure (3:26)
Setup DVWA (8:43)
Install Required Tools (5:59)
Setup Browser With BurpSuite (7:10)
Setting the DVWA Security Level (1:43)
Gather the Information
How Websites Work? (2:34)
Passive Information Gathering (10:16)
Active Information Gathering (3:44)
Code Review VS Fussing (3:52)
Cross Site Scripting (XSS)
What is Cross Site Scripting (XSS) (2:21)
Stored Cross Site Scripting (XSS) Vulnerability (7:38)
Reflected Cross Site Scripting (XSS) Vulnerability (7:40)
Cross Site Request Forgery (CSRF)
What is Cross Site Request Forgery (CSRF) (1:41)
Cross Site Request Forgery (CSRF) Vulnerability (12:49)
SQL Injection Explained
What is SQL Injection (4:47)
Automating SQL Injection with SQLMAP (11:37)
Command Execution
What is Command Execution (1:53)
Command Execution Vulnerability (10:54)
File Upload Vulnerability
Vulenerable File Uploads Vulnerability (0:53)
File Upload Vulnerability (11:40)
Most Popular Web Shells (4:31)
Brute Force Attack
What Is A Brute Force Attack? (3:03)
Brute Force Attack Example (8:53)
Some Real World Hacking
Automate The Process Using VEGA Scanner (8:46)
Exploiting Script Source Code Disclosure Vulnerability (5:49)
Automate The Process Using ARACHNI Scanner (8:48)
Most Popular Web Shells
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock