Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Hacking Web Applications and Penetration Testing: Fast Start
Introduction
Introduction (1:19)
Virtual Platforms (1:29)
Enabling Virtualization (VT-x or AMD-V) in BIOS
Lab's Architecture Diagram (2:11)
Using VirtualBox vs VMware
Install & Run Oracle VM VirtualBox (5:02)
Installing Kali using the VMware Image - Step 1 (3:13)
Installing Kali using the VMware Image - Step 2 (4:47)
Installing Kali using the VMware Image - Step 3 (4:30)
Installing Kali using the ISO file for VMware - Step 1 (1:26)
Installing Kali using the ISO file for VMware - Step 2 (6:48)
Installing Kali using the ISO file for VMware - Step 3 (2:41)
Installing Kali on VirtualBox using the OVA file - Step 1 (3:14)
Installing Kali on VirtualBox using the OVA file - Step 2 (6:44)
Installing Kali on VirtualBox using the OVA file - Step 3 (4:11)
Installing Kali using the ISO file for VirtualBox - Step 1 (1:26)
Installing Kali using the ISO file for VirtualBox - Step 2 (6:49)
Installing Kali using the ISO file for VirtualBox - Step 3 (4:23)
Download & Install OWASPBWA (4:30)
Accessing OWASP BWA (0:54)
Configuring NAT Network in Oracle VM VirtualBox (1:07)
Test VMs If They see Each Other (2:58)
Technologies & Standards
Basic Terms & Standards (5:35)
HTTP Protocol Basics and SSL (7:03)
Intercepting HTTP Traffic with Burp Suite (3:46)
Intercepting HTTPS Traffic with Burp Suite (2:50)
Web Attacks Classification (1:36)
An Automated Tool: OWASP ZAP (Zed Attack Proxy)
Introduction to OWASP ZAP (3:06)
Installation of OWASP ZAP & a Quick Scan (6:25)
Using OWASP ZAP as a Personal Proxy (4:40)
Intercepting HTTPS Traffics with OWASP ZAP (2:17)
Scanning a Website Which Requires Authentication (14:46)
Information Gathering & Configuration Management
Information Gathering & Configuration Management Part 1 (5:09)
Information Gathering & Configuration Management Part 2 (4:26)
Input - Output Manipulation
SOP, Javascript and Input-Output Validation (7:42)
XSS (Cross Site Scripting) - Reflected XSS (4:05)
XSS (Cross Site Scripting) - Stored and DOM Based XSS (7:01)
BeEF - The Browser Exploitation Framework (5:39)
SQL Injection Part 1 (4:20)
SQL Injection Part 2 (4:41)
SQL Injection Part 3 (5:20)
quiz
Authentication and Authorization
Authentication (5:36)
Authentication Attacks (5:13)
An Online Dictionary Attack with Hydra (10:01)
Authorization (5:18)
Path Traversal Demo (3:40)
quiz
Session Management and Cross Site Request Forgery
Session Management (3:03)
Session Fixation & Demo (4:22)
Cross Site Request Forgery (5:12)
Information Gathering Through the Internet
Introduction (6:00)
Using Search Engines & Google Hacking to Gather Information (3:36)
Search Engine Tools: SiteDigger and SearchDiggity (3:59)
Shodan (2:50)
Gathering Information about the People (3:10)
Web Archives (1:53)
FOCA Fingerprinting Organisations with Collected Archives (7:41)
The Harvester & Recon-NG (3:15)
Maltego - Visual Link Analysis Tool (4:38)
Introduction
Complete and Continue