[FreeCourseSite.Com] Udemy - Website Hacking Penetration Testing &Amp; Bug Bounty Hunting

Torrent Details

[FreeCourseSite.com] Udemy - Website Hacking  Penetration Testing & Bug Bounty Hunting[FreeCourseSite.com] Udemy - Website Hacking  Penetration Testing & Bug Bounty Hunting

NAME
[FreeCourseSite.com] Udemy - Website Hacking Penetration Testing & Bug Bounty Hunting.torrent
CATEGORY
Other
INFOHASH
7ab446d27126be0d852e5892e854ed19630ec795
SIZE
1.8 GB in 96 files
ADDED
Uploaded on 06-05-2020 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Become a bug bounty hunter! Hack websites & web applications like black hat hackers and secure them like experts.
What you’ll learn
Install hacking lab & needed software (works on Windows, OS X and Linux).

Discover, exploit and mitigate a number of dangerous vulnerabilities.

Use advanced techniques to discover and exploit these vulnerabilities.

Bypass security measurements and escalate privileges.
Intercept requests using a proxy.
Hack all websites on same server.
Bypass filters and client-side security
Adopt SQL queries to discover and exploit SQL injections in secure pages
Gain full control over target server using SQL injections
Discover & exploit blind SQL injections
Install Kali Linux – a penetration testing operating system
Install windows & vulnerable operating systems as virtual machines for testing
Learn linux commands and how to interact with the terminal
Learn linux basics
Understand how websites & web applications work
Understand how browsers communicate with websites
Gather sensitive information about websites
Discover servers, technologies and services used on target website
Discover emails and sensitive data associated with a specific website
Find all subdomains associated with a website
Discover unpublished directories and files associated with a target website
Find all websites hosted on the same server as the target website
Discover, exploit and fix file upload vulnerabilities
Exploit advanced file upload vulnerabilities & gain full control over the target website
Discover, exploit and fix code execution vulnerabilities
Exploit advanced code execution vulnerabilities & gain full control over the target website
Discover, exploit & fix local file inclusion vulnerabilities
Exploit advanced local file inclusion vulnerabilities & gain full control over the target website
Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website
Discover, fix, and exploit SQL injection vulnerabilities
Bypass login forms and login as admin using SQL injections
Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections
Bypass filtering, and login as admin without password using SQL injections
Bypass filtering and security measurements
Read / Write files to the server using SQL injections
Patch SQL injections quickly
Learn the right way to write SQL queries to prevent SQL injections
Discover basic & advanced reflected XSS vulnerabilities
Discover basic & advanced stored XSS vulnerabilities
Discover DOM-based XSS vulnerabilities
How to use BeEF framwork
Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities
Steal credentials from hooked victims
Run javascript code on hooked victims
Create an undetectable backdoor
Hack into hooked computers and gain full control over them
Fix XSS vulnerabilities & protect yourself from them as a user
What do we mean by brute force & wordlist attacks
Create a wordlist or a dictionary
Launch a wordlist attack and guess admin’s password
Discover all of the above vulnerabilities automatically using a web proxy
Run system commands on the target webserver
Access the file system (navigate between directories, read/write files)
Download, upload files
Bypass security measurements
Access all websites on the same webserver
Connect to the database and execute SQL queries or download the whole database to the local machine


For more Courses: Free Udemy Courses

For Tech Tricks and deals: Hot Pass

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
1. Chapter 1/1. Course Introduction.mp426 MB
1. Chapter 1/1. Course Introduction.srt3.5 KB
10. SQL Injection Vulnerabilities/1. What is SQL.mp410.5 MB
10. SQL Injection Vulnerabilities/1. What is SQL.srt7.6 KB
10. SQL Injection Vulnerabilities/2. Dangers of SQL Injections.mp46.7 MB
10. SQL Injection Vulnerabilities/2. Dangers of SQL Injections.srt4 KB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/1. Discovering SQL Injections In POST.mp415.5 MB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/1. Discovering SQL Injections In POST.srt10.6 KB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/1.1 Fix table metasploit.accounts doesn't exist issue.html121 B
11. SQL Injection Vulnerabilities - SQLi In Login Pages/2. Bypassing Logins Using SQL Injection Vulnerability.mp48.1 MB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/2. Bypassing Logins Using SQL Injection Vulnerability.srt6.7 KB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/3. Bypassing More Secure Logins Using SQL Injections.mp411.4 MB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/3. Bypassing More Secure Logins Using SQL Injections.srt8.6 KB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/4. [Security] Preventing SQL Injections In Login Pages.mp411.9 MB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/4. [Security] Preventing SQL Injections In Login Pages.srt9.8 KB
12. SQL injection Vulnerabilities - Extracting Data From The Database/1. Discovering SQL Injections in GET.mp415.4 MB
12. SQL injection Vulnerabilities - Extracting Data From The Database/1. Discovering SQL Injections in GET.srt8.9 KB
12. SQL injection Vulnerabilities - Extracting Data From The Database/2. Reading Database Information.mp49.1 MB
12. SQL injection Vulnerabilities - Extracting Data From The Database/2. Reading Database Information.srt6.1 KB
12. SQL injection Vulnerabilities - Extracting Data From The Database/3. Finding Database Tables.mp46.1 MB
12. SQL injection Vulnerabilities - Extracting Data From The Database/3. Finding Database Tables.srt3.4 KB
12. SQL injection Vulnerabilities - Extracting Data From The Database/4. Extracting Sensitive Data Such As Passwords.mp47.6 MB
12. SQL injection Vulnerabilities - Extracting Data From The Database/4. Extracting Sensitive Data Such As Passwords.srt5.2 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/1. Discovering & Exploiting Blind SQL Injections.mp47.9 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/1. Discovering & Exploiting Blind SQL Injections.srt7.6 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/1.1 sqli-tips.txt415 B
13. SQL injection Vulnerabilities - Advanced Exploitation/1.2 sqli-quries.txt760 B
13. SQL injection Vulnerabilities - Advanced Exploitation/10. Getting a Direct SQL Shell using SQLmap.mp46.4 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/10. Getting a Direct SQL Shell using SQLmap.srt3.1 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/11. [Security] - The Right Way To Prevent SQL Injection Vulnerabilites.mp48.4 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/11. [Security] - The Right Way To Prevent SQL Injection Vulnerabilites.srt6.2 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/2. Discovering Complex SQL Injection Vulnerabilities.mp413 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/2. Discovering Complex SQL Injection Vulnerabilities.srt9.5 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/3. Exploiting an advanced SQL Injection Vulnerability to Extract Passwords.mp47.7 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/3. Exploiting an advanced SQL Injection Vulnerability to Extract Passwords.srt5.5 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/4. Bypassing Filters.mp46.5 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/4. Bypassing Filters.srt6 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/5. Bypassing Security & Accessing All Records.mp469.3 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/5. Bypassing Security & Accessing All Records.srt10.5 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/6. [Security] Quick Fix To Prevent SQL Injections.mp413.2 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/6. [Security] Quick Fix To Prevent SQL Injections.srt9 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/7. Reading & Writing Files On The Server Using SQL Injections.mp412.6 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/7. Reading & Writing Files On The Server Using SQL Injections.srt7 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/8. Getting A Shell & Controlling The Target Server Using an SQL Injection.mp412.6 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/8. Getting A Shell & Controlling The Target Server Using an SQL Injection.srt10.8 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/9. Discovering SQL Injections & Extracting Data Using SQLmap.mp421.5 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/9. Discovering SQL Injections & Extracting Data Using SQLmap.srt8.4 KB
14. XSS Vulnerabilities/1. Introduction - What is XSS or Cross Site Scripting.mp46.8 MB
14. XSS Vulnerabilities/1. Introduction - What is XSS or Cross Site Scripting.srt3.9 KB
14. XSS Vulnerabilities/2. Discovering Basic Reflected XSS.mp46.4 MB
14. XSS Vulnerabilities/2. Discovering Basic Reflected XSS.srt4.2 KB
14. XSS Vulnerabilities/3. Discovering Advanced Reflected XSS.mp47.7 MB
14. XSS Vulnerabilities/3. Discovering Advanced Reflected XSS.srt5.9 KB
14. XSS Vulnerabilities/3.1 XSS Filter Evasion Cheat Sheet.html123 B
14. XSS Vulnerabilities/4. Discovering An Even More Advanced Reflected XSS.mp411.7 MB
14. XSS Vulnerabilities/4. Discovering An Even More Advanced Reflected XSS.srt9.4 KB
14. XSS Vulnerabilities/5. Discovering Stored XSS.mp45.4 MB
14. XSS Vulnerabilities/5. Discovering Stored XSS.srt3.9 KB
14. XSS Vulnerabilities/6. Discovering Advanced Stored XSS.mp45.8 MB
14. XSS Vulnerabilities/6. Discovering Advanced Stored XSS.srt4.6 KB
15. XSS Vulnerabilities - Exploitation/1. Hooking Victims To BeEF Using Reflected XSS.mp410.5 MB
15. XSS Vulnerabilities - Exploitation/1. Hooking Victims To BeEF Using Reflected XSS.srt7.4 KB
15. XSS Vulnerabilities - Exploitation/10. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp417.9 MB
15. XSS Vulnerabilities - Exploitation/10. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.srt9 KB
15. XSS Vulnerabilities - Exploitation/11. Gaining Full Control Over Windows Target.mp46.4 MB
15. XSS Vulnerabilities - Exploitation/11. Gaining Full Control Over Windows Target.srt4.6 KB
15. XSS Vulnerabilities - Exploitation/12. [Security] Fixing XSS Vulnerabilities.mp417.2 MB
15. XSS Vulnerabilities - Exploitation/12. [Security] Fixing XSS Vulnerabilities.srt9.4 KB
15. XSS Vulnerabilities - Exploitation/2. Hooking Victims To BeEF Using Stored XSS.mp47 MB
15. XSS Vulnerabilities - Exploitation/2. Hooking Victims To BeEF Using Stored XSS.srt5.4 KB
15. XSS Vulnerabilities - Exploitation/3. Interacting With Hooked Targets.mp46.5 MB
15. XSS Vulnerabilities - Exploitation/3. Interacting With Hooked Targets.srt5.4 KB
15. XSS Vulnerabilities - Exploitation/4. Running Basic Commands On Victims.mp48 MB
15. XSS Vulnerabilities - Exploitation/4. Running Basic Commands On Victims.srt5.8 KB
15. XSS Vulnerabilities - Exploitation/5. Stealing CredentialsPasswords Using A Fake Login Prompt.mp44.3 MB
15. XSS Vulnerabilities - Exploitation/5. Stealing CredentialsPasswords Using A Fake Login Prompt.srt3 KB
15. XSS Vulnerabilities - Exploitation/6. Bonus - Installing Veil Framework.mp441.6 MB
15. XSS Vulnerabilities - Exploitation/6. Bonus - Installing Veil Framework.srt7.9 KB
15. XSS Vulnerabilities - Exploitation/6.1 Veil Git Repo.html100 B
15. XSS Vulnerabilities - Exploitation/7. Bonus - Veil Overview & Payloads Basics.mp413.6 MB
15. XSS Vulnerabilities - Exploitation/7. Bonus - Veil Overview & Payloads Basics.srt10 KB
15. XSS Vulnerabilities - Exploitation/8. Bonus - Generating An Undetectable Backdoor Using Veil 3.mp421 MB
15. XSS Vulnerabilities - Exploitation/8. Bonus - Generating An Undetectable Backdoor Using Veil 3.srt12.4 KB
15. XSS Vulnerabilities - Exploitation/8.1 Another way of generating an undetectable backdoor.html137 B
15. XSS Vulnerabilities - Exploitation/8.2 Nodistribute - Online Virus Scanner.html86 B
15. XSS Vulnerabilities - Exploitation/8.3 Alternative to Nodistribute.html87 B
15. XSS Vulnerabilities - Exploitation/9. Bonus - Listening For Incoming Connections.mp412.6 MB
15. XSS Vulnerabilities - Exploitation/9. Bonus - Listening For Incoming Connections.srt9.1 KB
16. Insecure Session Management/1. Logging In As Admin Without a Password By Manipulating Cookies.mp412.6 MB
16. Insecure Session Management/1. Logging In As Admin Without a Password By Manipulating Cookies.srt7.3 KB
16. Insecure Session Management/2. Discovering Cross Site Request Forgery Vulnerabilities (CSRF).mp419.1 MB
16. Insecure Session Management/2. Discovering Cross Site Request Forgery Vulnerabilities (CSRF).srt9.3 KB
16. Insecure Session Management/3. Exploiting CSRF To Change Admin Password Using a HTML File.mp417.7 MB
16. Insecure Session Management/3. Exploiting CSRF To Change Admin Password Using a HTML File.srt9.3 KB
16. Insecure Session Management/4. Exploiting CSRF Vulnerabilities To Change Admin Password Using Link.mp414.6 MB
16. Insecure Session Management/4. Exploiting CSRF Vulnerabilities To Change Admin Password Using Link.srt7.6 KB

Alternative Torrents for 'FreeCourseSite.com Udemy Website Hacking Penetration Testing Bug Bounty Hunting'.

There are no alternative torrents found.