About This Course
Course Curriculum
-
About The Course
00:03:00
-
Web Attack Simulation Lab
00:12:00
-
Web application technologies 101 – PDF
01:34:00 -
HTTP Protocol Basics
00:11:00 -
Encoding Schemes
00:13:00 -
Same Origin Policy – SOP
00:06:00 -
HTTP Cookies
00:11:00 -
Cross-origin resource sharing
00:05:00 -
Web application proxy – Burp suite
00:09:00
-
Fingerprinting web server
00:05:00 -
DNS Analysis – Enumerating subdomains
00:04:00 -
Metasploit for web application attacks
00:12:00 -
Web technologies analysis in real time
00:03:00 -
Outdated web application to server takeover
00:08:00 -
BruteForcing Web applications
00:06:00 -
Shodan HQ
00:07:00 -
Harvesting the data
00:05:00 -
Finding link of target with Maltego CE
00:09:00
-
Cross Site Scripting- XSS – PDF
01:08:00 -
Cross site scripting
00:07:00 -
Reflected XSS
00:14:00 -
Persistent XSS
00:11:00 -
DOM-based XSS
00:10:00 -
Website defacement through XSS
00:09:00 -
XML Documents & database
00:14:00 -
Generating XSS attack payloads
00:13:00 -
XSS in PHP, ASP & JS Code review
00:13:00 -
Cookie stealing through XSS
00:12:00 -
Advanced XSS phishing attacks
00:08:00 -
Advanced XSS with BeEF attacks
00:10:00 -
Advanced XSS attacks with Burp suite
00:08:00 -
Code Review Guide
06:20:00
-
SQL Injection attacks – PDF
01:30:00 -
Introduction to SQL Injection
00:16:00 -
Dangers of SQL Injection
00:05:00 -
Hunting for SQL Injection vulnerabilities
00:20:00 -
In-band SQL Injection attacks
00:27:00 -
Blind SQL Injection attack in-action
00:10:00 -
Exploiting SQL injection – SQLMap
00:09:00 -
Fuzzing for SQL Injection – Burp Intruder
00:14:00
-
CSRF or XSRF attack methods
00:12:00 -
Anti-CSRF Token methods
00:15:00 -
Anti-CSRF token stealing-NOT easy
00:11:00
-
Authentication bypass-hydra
00:11:00 -
HTTP Verb Tampering
00:09:00 -
HTTP parameter pollution – HPP
00:06:00 -
Authentication
00:10:00
-
Client side control bypass
00:10:00
-
LFI & RFI attacks
00:13:00 -
Unrestricted file upload – content type
00:06:00 -
Unrestricted File Upload – Extension Type
00:06:00 -
Remote code execution using Shell Uploads
00:09:00
-
XML Documents & database
00:14:00 -
XXE attacks in action
00:14:00
-
Advance intruder attack types
00:23:00 -
Finding details with open source
00:17:00
-
Assignment -Web Application Penetration Testing Course