Udemy - Learn Step By Step Web Hacking And Penetration Testing

Torrent Details

Udemy - Learn Step by Step Web Hacking and Penetration TestingUdemy - Learn Step by Step Web Hacking and Penetration Testing

NAME
Udemy - Learn Step by Step Web Hacking and Penetration Testing.torrent
CATEGORY
Other
INFOHASH
55869c7821e81142dc3a4ad1ebececee565d70a8
SIZE
1.8 GB in 89 files
ADDED
Uploaded on 17-08-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

[ DevCourseWeb.com ] Learn Step by Step Web Hacking and Penetration Testing



If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com







Last updated 12/2019

Duration: 9h 23m | Video: .MP4, 1280x720 30 fps | Audio: AAC, 48 kHz, 2ch | Size: 1.78 GB

Genre: eLearning | Language: English



You will learn hacking tools, methodologies and techniques and and learn how to secure them from these hackers.



What you'll learn

Understand and perform the basic steps in order to performa penetration testing of a web application

Understand web application's security principles and potential dangers

Be able to gather information about your target

You will learn how to find vulnerabilities in your target web application

Exploit found vulnerabilities and get control over remote servers

Understand the penetration testing process

As a web application developer you will understand how to secure your application

Requirements

Basic IT skills

Basic knowledge of Linux and/or Windows

Understand basic computer networking

Description

In order to protect yourself from hackers, you must think as one.

This training is based on a practical approach of day-by-day situations and it contain labs based on real environments.

In this course, you will start as a

beginner

with no previous knowledge about penetration testing or hacking.

This course is focused on the

practical side of penetration

testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to

set up a lab and install needed software

to practice penetration testing on your own machine.

The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.

Once you understand how websites work we will start talking about how can we

exploit these components

. This course will take you

from a beginner to a more advanced level --

so you will be able to launch attacks and test the security of websites and web applications, and furthermore

you'll be able to help fixing these vulnerabilities

and

secure websites

from them.

Below are the main topics, both

theoretical and practical

, of this course

Core problems (Causes. Defences)

Web Technologies (HTTP Protocol, Web Functionality, Encoding)

Mapping (Spidering and Analysing)

Attacking Authentication (Technologies, Flaws, Fixes, Brute Force)

Attacking Session Management (State, Tokens, Flaws)

Attacking Access Controls (Common Vulnerabilities, Attacks)

Attacking Data Stores (SQL Injection, Bypassing Filters, Escalation)

Bypassing Client-Side Controls (Browser Interception, HTML interception, Fixes)

Attacking the server (OS command Injection, Path Traversal, Mail Injection, File Upload)

Attacking Application Logic

Cross Site Scripting

Attacking Users (CSRF, ClickJacking, HTML Injection)

OWASP Top Ten Vulnerabilities

Network Attacks

Labs

Spidering, Website Analyser

Brute-Force

Session Hijacking via Mann-in-The-Middle

Get Gmail or Facebook Passwords via SSLStrip

SQL Injection

Upload File and Remote Execution

Cross-Site Scripting (Stored + Reflected, Cookie Stealing, Preventing XSS)

CSRF (Change password trough CSRF vuln., Preventing CSRF)

NOTE: This course is created only for educational purposes and all the attacks are launched in an isolated lab environment.

Who this course is for

Web developers

Anyone who want to learn the ethical hacking and penetration testing process

IT students and/or passionate

Anyone who wants to start or develop a career in it security field or as "ethical hacker"



Homepage



If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com



Get More Tutorials and Support Us -->> https://FreeCourseWeb.com



We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...



Image error



Image error

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/01 - Why Web Security - Introduction/001 Introduction.mp46.6 MB
~Get Your Files Here !/01 - Why Web Security - Introduction/001 Introduction_en.srt1.5 KB
~Get Your Files Here !/01 - Why Web Security - Introduction/002 Core Problems - Why Web Security.mp458.5 MB
~Get Your Files Here !/01 - Why Web Security - Introduction/002 Core Problems - Why Web Security_en.srt8 KB
~Get Your Files Here !/01 - Why Web Security - Introduction/002 Core-Problems.pdf1.2 MB
~Get Your Files Here !/01 - Why Web Security - Introduction/003 Web-Technologies.pdf1.1 MB
~Get Your Files Here !/01 - Why Web Security - Introduction/004 Preparing the Lab Environment.mp450.5 MB
~Get Your Files Here !/01 - Why Web Security - Introduction/004 Preparing the Lab Environment_en.srt6.2 KB
~Get Your Files Here !/01 - Why Web Security - Introduction/004 Preparing-The-Lab-Environment.pdf175.6 KB
~Get Your Files Here !/01 - Why Web Security - Introduction/005 Information Gathering using Search Engines and Social Networks - part 1.mp471.7 MB
~Get Your Files Here !/01 - Why Web Security - Introduction/005 Information Gathering using Search Engines and Social Networks - part 1_en.srt13.6 KB
~Get Your Files Here !/01 - Why Web Security - Introduction/006 Information Gathering using Search Engines and Social Networks - part 2.mp439.9 MB
~Get Your Files Here !/01 - Why Web Security - Introduction/006 Information Gathering using Search Engines and Social Networks - part 2_en.srt18.7 KB
~Get Your Files Here !/01 - Why Web Security - Introduction/007 Join Our Online Classroom!.html1.8 KB
~Get Your Files Here !/02 - Mapping the Web Application. User and Password Brute-Forcing/001 Mapping.pdf751.1 KB
~Get Your Files Here !/02 - Mapping the Web Application. User and Password Brute-Forcing/002 Brute-Forcing-Passwords.pdf932.7 KB
~Get Your Files Here !/02 - Mapping the Web Application. User and Password Brute-Forcing/002 Usernames and Passwords Brute-Forcing using Burp.mp453.6 MB
~Get Your Files Here !/02 - Mapping the Web Application. User and Password Brute-Forcing/002 Usernames and Passwords Brute-Forcing using Burp_en.srt11.8 KB
~Get Your Files Here !/02 - Mapping the Web Application. User and Password Brute-Forcing/003 Spider and Analyze a Website using Burp.mp418.6 MB
~Get Your Files Here !/02 - Mapping the Web Application. User and Password Brute-Forcing/003 Spider and Analyze a Website using Burp_en.srt4.7 KB
~Get Your Files Here !/02 - Mapping the Web Application. User and Password Brute-Forcing/003 Spidering-Analyze-Webiste.pdf543 KB
~Get Your Files Here !/02 - Mapping the Web Application. User and Password Brute-Forcing/004 Brute-frocing Web Resources using Dirb and Dirbuster.mp433.3 MB
~Get Your Files Here !/02 - Mapping the Web Application. User and Password Brute-Forcing/004 Brute-frocing Web Resources using Dirb and Dirbuster_en.srt6.6 KB
~Get Your Files Here !/03 - Attacking Authentication and Session Management - Session Hijacking/001 Attacking-Authentication-And-Session-Management.pdf1.4 MB
~Get Your Files Here !/03 - Attacking Authentication and Session Management - Session Hijacking/002 Session Hijacking trough Man In The Middle Attack.mp4108.2 MB
~Get Your Files Here !/03 - Attacking Authentication and Session Management - Session Hijacking/002 Session Hijacking trough Man In The Middle Attack_en.srt8.5 KB
~Get Your Files Here !/03 - Attacking Authentication and Session Management - Session Hijacking/002 Session-Hijacking-MITM.pdf505.2 KB
~Get Your Files Here !/03 - Attacking Authentication and Session Management - Session Hijacking/003 Intercept and access traffic over HTTPS. Get Facebook or Gmail Passwords.mp479.3 MB
~Get Your Files Here !/03 - Attacking Authentication and Session Management - Session Hijacking/003 Intercept and access traffic over HTTPS. Get Facebook or Gmail Passwords_en.srt6.7 KB
~Get Your Files Here !/03 - Attacking Authentication and Session Management - Session Hijacking/003 SSL-Strip.pdf94.6 KB
~Get Your Files Here !/04 - Access controls. Data stores and Client-side Controls/001 Access-Controls-Data-Stores-Client-Side-Controls.pdf1.6 MB
~Get Your Files Here !/04 - Access controls. Data stores and Client-side Controls/002 3-SQ-Li-Upload-And-Remote-File.pdf1.3 MB
~Get Your Files Here !/04 - Access controls. Data stores and Client-side Controls/002 SQL injection.mp423.1 MB
~Get Your Files Here !/04 - Access controls. Data stores and Client-side Controls/002 SQL injection_en.srt7.8 KB
~Get Your Files Here !/04 - Access controls. Data stores and Client-side Controls/003 Exploiting SQLi using Sqlmap and Getting Remote Shell.mp458.2 MB
~Get Your Files Here !/04 - Access controls. Data stores and Client-side Controls/003 Exploiting SQLi using Sqlmap and Getting Remote Shell_en.srt10 KB
~Get Your Files Here !/04 - Access controls. Data stores and Client-side Controls/004 Upload and Remote File Execution.mp482.7 MB
~Get Your Files Here !/04 - Access controls. Data stores and Client-side Controls/004 Upload and Remote File Execution_en.srt9.3 KB
~Get Your Files Here !/05 - Attacking the Server and Application Logic/001 Attacking-The-Server.pdf820.5 KB
~Get Your Files Here !/05 - Attacking the Server and Application Logic/002 Attacking-The-Application-Logic.pdf389.8 KB
~Get Your Files Here !/06 - (XSS) Cross Site Scripting. Attacking the Users/001 Cross-Site-Scripting-Attacking-Users.pdf1.3 MB
~Get Your Files Here !/06 - (XSS) Cross Site Scripting. Attacking the Users/002 4-XSS-CSRF.pdf842.7 KB
~Get Your Files Here !/06 - (XSS) Cross Site Scripting. Attacking the Users/002 Reflected XSS – Session Hijacking using Cross Site Scripting.mp429.3 MB
~Get Your Files Here !/06 - (XSS) Cross Site Scripting. Attacking the Users/002 Reflected XSS – Session Hijacking using Cross Site Scripting_en.srt9.9 KB
~Get Your Files Here !/06 - (XSS) Cross Site Scripting. Attacking the Users/003 Stored or Persistent Cross Site Scripting.mp425 MB
~Get Your Files Here !/06 - (XSS) Cross Site Scripting. Attacking the Users/003 Stored or Persistent Cross Site Scripting_en.srt6.8 KB
~Get Your Files Here !/06 - (XSS) Cross Site Scripting. Attacking the Users/004 Beef-XSS Demo.mp4112.1 MB
~Get Your Files Here !/06 - (XSS) Cross Site Scripting. Attacking the Users/005 Cross-site Request Forgery (CSRF).mp446.7 MB
~Get Your Files Here !/06 - (XSS) Cross Site Scripting. Attacking the Users/005 Cross-site Request Forgery (CSRF)_en.srt6.8 KB
~Get Your Files Here !/07 - Guideline for Discovering and Improving Application Security/001 Bonus - OWASP Top 10 Vulnerabilities.mp496.2 MB
~Get Your Files Here !/07 - Guideline for Discovering and Improving Application Security/001 Bonus - OWASP Top 10 Vulnerabilities_en.srt19.6 KB
~Get Your Files Here !/07 - Guideline for Discovering and Improving Application Security/002 Overview-Of-Penetration-Testing.pdf1.8 MB
~Get Your Files Here !/08 - (Bonus) Burp Tool for Advanced Web Penetration Testing/001 Alternative setup - Download Burp. Free vs Paid.mp43.4 MB
~Get Your Files Here !/08 - (Bonus) Burp Tool for Advanced Web Penetration Testing/001 Alternative setup - Download Burp. Free vs Paid_en.srt1.7 KB
~Get Your Files Here !/08 - (Bonus) Burp Tool for Advanced Web Penetration Testing/002 Environment Setup. Import Burp Certificate.mp441.2 MB
~Get Your Files Here !/08 - (Bonus) Burp Tool for Advanced Web Penetration Testing/002 Environment Setup. Import Burp Certificate_en.srt8 KB
~Get Your Files Here !/08 - (Bonus) Burp Tool for Advanced Web Penetration Testing/003 Proxy - General Concept.mp415.2 MB
~Get Your Files Here !/08 - (Bonus) Burp Tool for Advanced Web Penetration Testing/004 Target Module.mp438.6 MB
~Get Your Files Here !/08 - (Bonus) Burp Tool for Advanced Web Penetration Testing/004 Target Module_en.srt9.8 KB
~Get Your Files Here !/08 - (Bonus) Burp Tool for Advanced Web Penetration Testing/005 Proxy Module - part 1.mp436.5 MB
~Get Your Files Here !/08 - (Bonus) Burp Tool for Advanced Web Penetration Testing/005 Proxy Module - part 1_en.srt12.8 KB
~Get Your Files Here !/08 - (Bonus) Burp Tool for Advanced Web Penetration Testing/006 Proxy Module - part 2.mp487.3 MB
~Get Your Files Here !/08 - (Bonus) Burp Tool for Advanced Web Penetration Testing/006 Proxy Module - part 2_en.srt9.8 KB
~Get Your Files Here !/08 - (Bonus) Burp Tool for Advanced Web Penetration Testing/007 Further information.html638 B
~Get Your Files Here !/09 - (Bonus) Network Attacks/001 Demo - Use Nessus to Discover Vulnerabilities.mp412.6 MB
~Get Your Files Here !/09 - (Bonus) Network Attacks/001 Demo - Use Nessus to Discover Vulnerabilities_en.srt3.4 KB
~Get Your Files Here !/09 - (Bonus) Network Attacks/002 Demo - Using Paros for Vulnerability Discovery.mp433 MB
~Get Your Files Here !/09 - (Bonus) Network Attacks/002 Demo - Using Paros for Vulnerability Discovery_en.srt4.1 KB
~Get Your Files Here !/09 - (Bonus) Network Attacks/003 Metasploit.mp494.7 MB
~Get Your Files Here !/09 - (Bonus) Network Attacks/003 Metasploit_en.srt20.1 KB
~Get Your Files Here !/09 - (Bonus) Network Attacks/004 Demo - Exploiting FTP Server Vulnerability using Metasploit.mp487.5 MB
~Get Your Files Here !/09 - (Bonus) Network Attacks/004 Demo - Exploiting FTP Server Vulnerability using Metasploit_en.srt8.8 KB
~Get Your Files Here !/09 - (Bonus) Network Attacks/005 Hacking Wireless Networks.mp430.9 MB
~Get Your Files Here !/09 - (Bonus) Network Attacks/005 Hacking Wireless Networks_en.srt7.2 KB
~Get Your Files Here !/10 - (Bonus) Android reverse Engineering/001 APK file Structure. AndroidManifest XML file.mp450.8 MB
~Get Your Files Here !/10 - (Bonus) Android reverse Engineering/001 APK file Structure. AndroidManifest XML file_en.srt6.6 KB
~Get Your Files Here !/10 - (Bonus) Android reverse Engineering/002 Reversing to get Source code of the Application - decompiling with dex2jar.mp431.2 MB
~Get Your Files Here !/10 - (Bonus) Android reverse Engineering/002 Reversing to get Source code of the Application - decompiling with dex2jar_en.srt10.4 KB
~Get Your Files Here !/10 - (Bonus) Android reverse Engineering/003 Reversing and Re-compiling With APKTool.mp438.5 MB
~Get Your Files Here !/10 - (Bonus) Android reverse Engineering/003 Reversing and Re-compiling With APKTool_en.srt7.4 KB
~Get Your Files Here !/10 - (Bonus) Android reverse Engineering/004 Static Analysis of Android Application using QARK.mp4128.5 MB
~Get Your Files Here !/10 - (Bonus) Android reverse Engineering/004 Static Analysis of Android Application using QARK_en.srt11.5 KB
~Get Your Files Here !/10 - (Bonus) Android reverse Engineering/005 Owasp Top 10 Mobile.mp434.8 MB
~Get Your Files Here !/10 - (Bonus) Android reverse Engineering/005 Owasp Top 10 Mobile_en.srt16.1 KB
~Get Your Files Here !/11 - (Bonus) Social Engineering Basics/001 Introduction to Maltego.mp430.1 MB
~Get Your Files Here !/11 - (Bonus) Social Engineering Basics/001 Introduction to Maltego_en.srt5.3 KB
~Get Your Files Here !/11 - (Bonus) Social Engineering Basics/002 Maltego - demo.mp428.6 MB
~Get Your Files Here !/11 - (Bonus) Social Engineering Basics/002 Maltego - demo_en.srt9.2 KB
~Get Your Files Here !/Bonus Resources.txt386 B

Alternative Torrents for 'Udemy Learn Step by Step Hacking and Penetration Testing'.

There are no alternative torrents found.