Complete Ethical Hacking Series: Hacking Applications
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1 student enrolled
Wishlisted Wishlist

Please confirm that you want to add Complete Ethical Hacking Series: Hacking Applications to your Wishlist.

Add to Wishlist

Complete Ethical Hacking Series: Hacking Applications

Complete Ethical Hacking Series (CEHv9): Hacking Applications
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1 student enrolled
Created by Chad Russell
Last updated 7/2017
English
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • You will start by hacking applications using tools such as Hamster, Ferret, ZAP and learn how to attack applications using AJAX and Persistent XSS Attacks in this course.
View Curriculum
Requirements
  • Students should have a working understanding of TCP/IP and networking concepts.
Description

Complete Ethical Hacking Series:  Social Engineering

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!    Each chapter closes with exercises putting your new learned skills into practical use immediately.   You will start by understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret.   Next you will learn how to conduct XSS attacks, buffer overflows and then learn how to hack AJAX. 

What are the pre-requisites for this course?

  1. Students should have a working understanding of TCP/IP and networking concepts. 

What will you be able to do after taking this course?

  • Hamster -   Hamster is a tool or “sidejacking”. It acts as a proxy server that replaces your cookies with session cookies stolen from somebody else, allowing you to hijack their sessions.


  • Ferret - Ferret is used to sniff cookies.  It can be used in conjunction with Hamster to conduct session hijacking attacks on the wire. 


  • Morpheus - Morpheus is a framework tool which automates TCP/UDP packet manipulation tasks by using etter filters to manipulate target requests/responses under MitM attacks replacing the TCP/UDP packet contents by our contents before forward the packet back to the target host.


  • Zed Attack Proxy -   TheOWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.


  • Buffer Overflow Attacks - A buffer overflow condition exists when a program attempts to put more data in a buffer than it can hold or when a program attempts to put data in a memory area past a buffer. In this case, a buffer is a sequential section of memory allocated to contain anything from a character string to an array of integers. Writing outside the bounds of a block of allocated memory can corrupt data, crash the program, or cause the execution of malicious code.
  • Hacking AJAX - Asynchronous Javascript and XML (AJAX) is one of the latest techniques used by web application developers to provide a user experience similar to that of a traditional (i.e., "pre-web") application. Since AJAX is still a new technology, there are many security issues that have not yet been fully researched. Some of the security issues in AJAX include:


    • Increased attack surface with many more inputs to secure
    • Exposed internal functions of the application
    • Client access to third-party resources with no built-in security and encoding mechanisms
    • Failure to protect authentication information and sessions
    • Blurred line between client-side and server-side code, possibly resulting in security mistakes


  • Heap Spraying - Heap spraying refers to the attempt to insert code into a predetermined location using the exploits of vulnerable browsers. “Heap” comes from the term heap-based memory allocation (also known as dynamic memory allocation), which is the allowance of memory storage to be used by a computer program when it runs.



Who is the target audience?
  • This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
9 Lectures
01:15:22
+
Complete Ethical Hacking Series: Hacking Applications
9 Lectures 01:15:22

Hamster and Ferret
05:56


Heap Spraying Demonstration
04:30

Zed Attack Proxy
12:13

Persistent XSS Demo
01:53

Buffer Overflow Demonstration
04:36

Buffer Overflows Explained
23:53

Hacking AJAX
10:03
About the Instructor
Chad Russell
3.6 Average rating
1,050 Reviews
16,805 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!