Website and Web Application Hacking in Practice
Ethical hacking training is dedicated to programmers and website administrators. Website security unleashed.
Website Hacking and Web Application Vulnerabilities in Practice
Before we begin – the practical use of the training you are going to see has been proven by vast group of people – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, black- and white hat hackers. Please, read carefully what we’d like to share with you.
The course covers all important hacking techniques used by hackers and system administrators. About the Ethical Hacking Training course (what you can expect):
- It is a step by step training on Website and Web-application ethical hacking and security.
- It covers almost all of the Top 10 Most Critical Web Application Attacks presented yearly by OWASP organization (Open Web Application Security Project) + 10 common techniques / vulnerabilities more.
- It can be treated as a valuable source of knowledge for any white hat hacker, web developer, system administrator or IT security consultant.
- You will learn how to hack using 21 interesting techniques and see how each of them can be used in a practical real-life example.
- You will get access to all the lectures in PDF format and live Ethical Hacking Video Training sessions you can watch on-line.
- Every lecture also contains a video session transcript with screen shots – you can print it and use it during your training.
- Finally you will be provided with all the source codes and examples shown in the course. You can simply download the zip package from our server.
WHAT YOU WILL LEARN in this Ethical Hacking Training:
- Module 01. Introduction and environment configuration – you will learn how to configure and prepare your system for the further training. All you need is a Windows system.
- Module 02. Deep data hiding.
- Module 03. Brute-force and dictionary attacks – you will get to know how an attacker could perform a brute-force or a dictionar attack on your website or web application containing a password protected data.
- Module 04. Account lockout attack.
- Module 05. Web parameter tampering – you will learn how to tamper hidden data used by websites. You will use the presented technique in a real-life example. Very important lesson.
- Module 06. Path and information disclosure.
- Module 07. Forced browsing – you will see how an attacker could “sniff” a sensitive data from a website using a forced browsing.
- Module 08. Path traversal – you will learn a path traversal method and use it in practice in your training environment.
- Module 09. Unicode encoding – encoding related vulnerabilities.
- Module 10. Parameter delimiter – you will learn how to take advantage of input filtering bugs. After this lesson you will be able to create an admin account – of course without having the administrator privileges.
- Module 11. PHP injection – you will be demonstrated a PHP code injection practical attack. Very important lesson. You will see how a malicious data can be injected into a website, e.g. using a crafted image or text string.
- Module 12. Direct static code injection – you will learn what a ststic code injection is and how it could be used by an attacker.
- Module 13. SQL injection – one of the TOP3 techniques used by attackers nowadays. Step by step practical demonstration. You can hack the training website yourself (without harming anybody).
- Module 14. XSS – Cross Site Scripting attack – you will see for yourself why XSS is considered the most popular hackers’ target. By the end on this lesson you will intercept a user session.
- Module 14B. XST – Cross Site Tracing attack.
- Module 15. XSRF – Cross Site Request Forgery attack – you will learn how an attacker can force an unaware user to reset a password.
- Module 16. Spying on data with a browser – no additional comment needed.
- Module 17. Session hijacking – lesson on session hijacking and consequences.
- Module 18. Session fixation.
- Module 19. Phishing – one of the most popular attacks. You will learn some tips to protect against it.
- Module 20. Automated security testing – you will be taught using automated security testing tools and learn what white, black and grey box testing is. Useful knowledge for web developers and IT security consultants.
IN EACH MODULE YOU WILL ALSO SEE HOW YOU CAN PROTECT YOUR WEBSITE OR WEB APPLICATION AGAINST EVERY VULNERABILITY DESCRIBED IN THE COURSE. MODULES ARE DIVIDED INTO: 1) THEORETICAL INTRODUCTION, 2) PRACTICAL ATTACK EXAMPLE, 3) SECURITY GUIDANCE.
WHAT YOU NEED TO KNOW BEFORE YOU BEGIN:
- This ethical hacking course is intended to help you regardless of your current knowledge and skills. All you need is a basic computer knowledge and a Windows system.
- We will show you how to prepare your training environment. In this environment you can experiment freely, without doing harm to anybody.
- All the modules were recorded in Windows 7 (from the attacker / victim point of view) but it doesn’t mean that the presented techniques apply only to Windows. Most of them are OS independent.
- You will download the ZIP package with all the source codes and examples from our server before you begin to avoid unnecessary code retyping.
- Every module (lesson) contains the attack related part, as well as a guidance to protect your own website, web application or web server.
What you will find inside can also be used by beginners – thanks to live Video Training attached to the course. Almost every module covered inside has been presented by a professional web developer.
Please be advised that all the techniques presented in “Website Hacking in Practice” course can only be used ethically and in your own testing / researching environment. Note that you will get all the required tools and information to prepare your own training system. Please see the Legal information in the 1st section for further legal reference.
We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the “Website Hacking in Practice” training is for you. You will get access to the whole system. If for any reason you’re not satisfied with your training, we will give you full refund. No questions asked.
We wish you the best,
The Hacking School Team
What are the requirements?
- basic IT knowledge
- Basic Microsoft Windows knowledge
What am I going to get from this course?
- Lectures in PDF + Live Video Training
- TOP 10 web app. and website related hacking techniques
- IT security essentials
- ZIP package with all the source codes and examples
- 21 important techniques
- Video sessions transcript of every module
What is the target audience?
- web / app developers
- system admins
- IT sec professionals
- everyone interested in hacking
- ethical hackers
|Table of Contents||FREE||00:02:00|
|Environment setup and training system configuration|
|Download ZIP package with source codes and examples||00:02:00|
|Module 01. Introduction and environment configuration||00:51:00|
|Module 02. Deep data hiding||00:17:00|
|Module 03. Brute-force and dictionary attacks||00:44:00|
|Module 04. Account lockout attack||00:25:00|
|Lets get deeper - data leaks|
|Module 05. Web parameter tampering||00:22:00|
|Module 06. Path and information disclosure||00:31:00|
|Module 07. Forced browsing||00:15:00|
|Module 08. Path traversal||00:25:00|
|Module 09. Unicode encoding||00:06:00|
|Module 10. Parameter delimiter||00:26:00|
|Module 11. PHP injection||FREE||00:29:00|
|Module 12. Direct static code injection||00:26:00|
|Module 13. SQL injection||01:07:00|
|XSS related attacks|
|Module 14. XSS – Cross Site Scripting attack||00:39:00|
|Module 14B. XST – Cross Site Tracing attack||00:27:00|
|Module 15. XSRF – Cross Site Request Forgery attack||00:36:00|
|Module 16. Spying on data with a browser||00:35:00|
|Module 17. Session hijacking||00:20:00|
|Module 18. Session fixation||00:23:00|
|Module 19. Phishing||00:23:00|
|Security testing in practice|
|Module 20. Automated security testing||00:39:00|
|Summary and references||00:05:00|
No Reviews found for this course.