[Tutorialsplanet.NET] Udemy - Learn Website Hacking Penetration Testing From Scratch

Torrent Details


[Tutorialsplanet.NET] Udemy - Learn Website Hacking  Penetration Testing From Scratch

NAME
[Tutorialsplanet.NET] Udemy - Learn Website Hacking Penetration Testing From Scratch.torrent
CATEGORY
Other
INFOHASH
865410e06020e4da876052da6ae70adae149f605
SIZE
1.8 GB in 99 files
ADDED
Uploaded on 21-08-2019 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Udemy - Learn Website Hacking / Penetration Testing From Scratch [TP]



Welcome to my comprehensive course on Website & Web applications Hacking! This course assumes you have NO prior knowledge in hacking and by the end of it you'll be at a high level, being able to hack websites like black-hat hackers and secure them like security experts!

Note: Although some titles in this course might seem similar to one of my other courses, that course only covers the basics of website hacking where this one dives much deeper in this subject covering more advanced techniques and topics, these courses are designed to co-exist.

This course is highly practical but it won't neglect the theory, first you'll learn how to install the needed software (works on Windows, Linux and Mac OS X) and then we'll start with basics about how websites work, the different components that make a website, the technologies used, and then we'll dive into website hacking straight away. From here onwards you'll learn everything by example, by discovering vulnerabilities and exploiting them to hack into websites, so we'll never have any dry boring theoretical lectures.

Before jumping into hacking, you'll first learn how to gather comprehensive information about your target website, then the course is divided into a number of sections, each section covers how to discover, exploit and mitigate a common web application vulnerability, for each vulnerability you will first learn the basic exploitation, then you will learn advanced techniques to bypass security, escalate your privileges, access the database, and even use the hacked websites to hack into other websites on the same server.

You will learn how and why these vulnerabilities are exploitable, how to fix them and what are the right practices to avoid causing them.

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
1. Chapter 1/1. Course Introduction.mp426 MB
1. Chapter 1/1. Course Introduction.vtt3.1 KB
10. SQL Injection Vulnerabilities/1. What is SQL.mp410.5 MB
10. SQL Injection Vulnerabilities/1. What is SQL.vtt6.7 KB
10. SQL Injection Vulnerabilities/2. Dangers of SQL Injections.mp46.7 MB
10. SQL Injection Vulnerabilities/2. Dangers of SQL Injections.vtt3.6 KB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/1. Discovering SQL Injections In POST.mp415.5 MB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/1. Discovering SQL Injections In POST.vtt9.3 KB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/1.1 Fix table metasploit.accounts doesn't exist issue.html121 B
11. SQL Injection Vulnerabilities - SQLi In Login Pages/2. Bypassing Logins Using SQL Injection Vulnerability.mp48.1 MB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/2. Bypassing Logins Using SQL Injection Vulnerability.vtt5.9 KB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/3. Bypassing More Secure Logins Using SQL Injections.mp411.4 MB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/3. Bypassing More Secure Logins Using SQL Injections.vtt7.5 KB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/4. [Security] Preventing SQL Injections In Login Pages.mp412 MB
11. SQL Injection Vulnerabilities - SQLi In Login Pages/4. [Security] Preventing SQL Injections In Login Pages.vtt8.6 KB
12. SQL injection Vulnerabilities - Extracting Data From The Database/1. Discovering SQL Injections in GET.mp415.4 MB
12. SQL injection Vulnerabilities - Extracting Data From The Database/1. Discovering SQL Injections in GET.vtt7.8 KB
12. SQL injection Vulnerabilities - Extracting Data From The Database/2. Reading Database Information.mp49.1 MB
12. SQL injection Vulnerabilities - Extracting Data From The Database/2. Reading Database Information.vtt5.3 KB
12. SQL injection Vulnerabilities - Extracting Data From The Database/3. Finding Database Tables.mp46.1 MB
12. SQL injection Vulnerabilities - Extracting Data From The Database/3. Finding Database Tables.vtt3 KB
12. SQL injection Vulnerabilities - Extracting Data From The Database/4. Extracting Sensitive Data Such As Passwords.mp47.6 MB
12. SQL injection Vulnerabilities - Extracting Data From The Database/4. Extracting Sensitive Data Such As Passwords.vtt4.6 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/1. Discovering & Exploiting Blind SQL Injections.mp47.9 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/1. Discovering & Exploiting Blind SQL Injections.vtt6.7 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/1.1 sqli-tips.txt.txt415 B
13. SQL injection Vulnerabilities - Advanced Exploitation/1.2 sqli-quries.txt.txt760 B
13. SQL injection Vulnerabilities - Advanced Exploitation/10. Getting a Direct SQL Shell using SQLmap.mp46.5 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/10. Getting a Direct SQL Shell using SQLmap.vtt2.7 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/11. [Security] - The Right Way To Prevent SQL Injection.mp48.4 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/11. [Security] - The Right Way To Prevent SQL Injection.vtt5.5 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/2. Discovering a More Complicated SQL Injection.mp413 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/2. Discovering a More Complicated SQL Injection.vtt8.3 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/3. Extracting Data (passwords) By Exploiting a More Difficult SQL Injection.mp47.7 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/3. Extracting Data (passwords) By Exploiting a More Difficult SQL Injection.vtt4.8 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/4. Bypassing Filters.mp46.5 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/4. Bypassing Filters.vtt5.3 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/5. Bypassing Security & Accessing All Records.mp469.3 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/5. Bypassing Security & Accessing All Records.vtt9.3 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/6. [Security] Quick Fix To Prevent SQL Injections.mp413.3 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/6. [Security] Quick Fix To Prevent SQL Injections.vtt8 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/7. Reading & Writing Files On The Server Using SQL Injection Vulnerability.mp412.6 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/7. Reading & Writing Files On The Server Using SQL Injection Vulnerability.vtt6.2 KB
13. SQL injection Vulnerabilities - Advanced Exploitation/9. Discovering SQL Injections & Extracting Data Using SQLmap.mp421.5 MB
13. SQL injection Vulnerabilities - Advanced Exploitation/9. Discovering SQL Injections & Extracting Data Using SQLmap.vtt7.4 KB
14. XSS Vulnerabilities/1. Introduction - What is XSS or Cross Site Scripting.mp46.8 MB
14. XSS Vulnerabilities/1. Introduction - What is XSS or Cross Site Scripting.vtt3.4 KB
14. XSS Vulnerabilities/2. Discovering Basic Reflected XSS.mp46.4 MB
14. XSS Vulnerabilities/2. Discovering Basic Reflected XSS.vtt3.6 KB
14. XSS Vulnerabilities/3. Discovering Advanced Reflected XSS.mp47.7 MB
14. XSS Vulnerabilities/3. Discovering Advanced Reflected XSS.vtt5.2 KB
14. XSS Vulnerabilities/3.1 XSS Filter Evasion Cheat Sheet.html123 B
14. XSS Vulnerabilities/4. Discovering An Even More Advanced Reflected XSS.mp411.7 MB
14. XSS Vulnerabilities/4. Discovering An Even More Advanced Reflected XSS.vtt8.3 KB
14. XSS Vulnerabilities/5. Discovering Stored XSS.mp45.5 MB
14. XSS Vulnerabilities/5. Discovering Stored XSS.vtt3.4 KB
14. XSS Vulnerabilities/6. Discovering Advanced Stored XSS.mp45.8 MB
14. XSS Vulnerabilities/6. Discovering Advanced Stored XSS.vtt4.1 KB
15. XSS Vulnerabilities - Exploitation/1. Hooking Victims To BeEF Using Reflected XSS.mp410.5 MB
15. XSS Vulnerabilities - Exploitation/1. Hooking Victims To BeEF Using Reflected XSS.vtt6.5 KB
15. XSS Vulnerabilities - Exploitation/10. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp417.9 MB
15. XSS Vulnerabilities - Exploitation/10. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.vtt7.9 KB
15. XSS Vulnerabilities - Exploitation/11. BeEF - Gaining Full Control Over Windows Target.mp46.4 MB
15. XSS Vulnerabilities - Exploitation/11. BeEF - Gaining Full Control Over Windows Target.vtt4 KB
15. XSS Vulnerabilities - Exploitation/12. [Security] Fixing XSS Vulnerabilities.mp417.2 MB
15. XSS Vulnerabilities - Exploitation/12. [Security] Fixing XSS Vulnerabilities.vtt8.4 KB
15. XSS Vulnerabilities - Exploitation/2. Hooking Victims To BeEF Using Stored XSS.mp47 MB
15. XSS Vulnerabilities - Exploitation/2. Hooking Victims To BeEF Using Stored XSS.vtt4.8 KB
15. XSS Vulnerabilities - Exploitation/3. BeEF - Interacting With Hooked Victims.mp46.5 MB
15. XSS Vulnerabilities - Exploitation/3. BeEF - Interacting With Hooked Victims.vtt6.5 MB
15. XSS Vulnerabilities - Exploitation/4. BeEF - Running Basic Commands On Victims.mp48 MB
15. XSS Vulnerabilities - Exploitation/4. BeEF - Running Basic Commands On Victims.vtt5.1 KB
15. XSS Vulnerabilities - Exploitation/5. BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt.mp44.3 MB
15. XSS Vulnerabilities - Exploitation/5. BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt.vtt2.6 KB
15. XSS Vulnerabilities - Exploitation/6. Bonus - Installing Veil 3.1.mp441.6 MB
15. XSS Vulnerabilities - Exploitation/6. Bonus - Installing Veil 3.1.vtt6.9 KB
15. XSS Vulnerabilities - Exploitation/6.1 Veil Git Repo.html100 B
15. XSS Vulnerabilities - Exploitation/7. Bonus - Veil Overview & Payloads Basics.mp413.6 MB
15. XSS Vulnerabilities - Exploitation/7. Bonus - Veil Overview & Payloads Basics.vtt8.8 KB
15. XSS Vulnerabilities - Exploitation/8. Bonus - Generating An Undetectable Backdoor Using Veil 3.mp421 MB
15. XSS Vulnerabilities - Exploitation/8. Bonus - Generating An Undetectable Backdoor Using Veil 3.vtt10.9 KB
15. XSS Vulnerabilities - Exploitation/8.1 Another way of generating an undetectable backdoor.html137 B
15. XSS Vulnerabilities - Exploitation/8.2 Nodistribute - Online Virus Scanner.html86 B
15. XSS Vulnerabilities - Exploitation/8.3 Alternative to Nodistribute.html87 B
15. XSS Vulnerabilities - Exploitation/9. Bonus - Listening For Incoming Connections.mp412.6 MB
15. XSS Vulnerabilities - Exploitation/9. Bonus - Listening For Incoming Connections.vtt7.9 KB
16. Insecure Session Management/1. Logging In As Admin Without a Password By Manipulating Cookies.mp412.6 MB
16. Insecure Session Management/1. Logging In As Admin Without a Password By Manipulating Cookies.vtt6.5 KB
16. Insecure Session Management/2. Discovering Cross Site Request Forgery Vulnerabilities (CSRF).mp419.1 MB
16. Insecure Session Management/2. Discovering Cross Site Request Forgery Vulnerabilities (CSRF).vtt8.2 KB
16. Insecure Session Management/3. Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File.mp417.7 MB
16. Insecure Session Management/3. Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File.vtt8.2 KB
16. Insecure Session Management/4. Exploiting CSRF Vulnerabilities To Change Admin Password Using Link.mp414.6 MB
16. Insecure Session Management/4. Exploiting CSRF Vulnerabilities To Change Admin Password Using Link.vtt6.7 KB
16. Insecure Session Management/5. [Security] The Right Way To Prevent CSRF Vulnerabilities.mp424.3 MB
16. Insecure Session Management/5. [Security] The Right Way To Prevent CSRF Vulnerabilities.vtt10.8 KB
17. Brute Force & Dictionary Attacks/1. What Are Brute Force & Dictionary Attacks.mp47.4 MB
17. Brute Force & Dictionary Attacks/1. What Are Brute Force & Dictionary Attacks.vtt4.8 KB
17. Brute Force & Dictionary Attacks/2. Creating a Wordlist.mp412.2 MB

Alternative Torrents for 'Tutorialsplanet.NET Udemy Learn Website Hacking Penetration Testing From Scratch'.

There are no alternative torrents found.