Ethical Hacking with Burp Suite
4.1 (21 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
120 students enrolled

Ethical Hacking with Burp Suite

This no fluff hands-on training will having you immediatly hacking web applications with Burp Suite.
4.1 (21 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
120 students enrolled
Created by Royce Davis
Last updated 3/2020
English
English [Auto]
Current price: $12.99 Original price: $19.99 Discount: 35% off
1 day left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Assignments
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Identify web application vulnerabilities and attack vectors
  • Exploit low-hanging fruit vulnerabilities in web applications
  • Step-by-step methodology for performing web application penetration tests
  • Practice techniques in hands-on lab environment
  • Analyze HTTP traffic using Burp Suite
  • Configure Burp Suite for maximized proficiency
Requirements
  • Ability to run Java
  • Thirst for knowledge
  • Ability to think creatively like an attacker
Description

HACKERS AND PENETRATION TESTERS HAVE ONE THING IN COMMON.


They know how to identify and exploit application vulnerabilities. Now, you can do the same!

By discovering a system or application's vulnerabilities before the hackers do, you can help organizations stop security breaches before they happen.

This intensive yet easy-to learn course will help you think and act like a Black Hat Hacker - without breaking the law - learning all you need to know about web hacking and penetration testing.

While "becoming a real ethical hacker" takes years of training in dozens of skills and disciplines, we'll cover all you need to master the basics of web hacking.

Who this course is for:
  • Beginner and intermediate ethical hackers and penetration testers
Course content
Expand all 13 lectures 01:01:04
+ Before we begin
2 lectures 04:13

How to obtain the latest copy of Burp Suite and set it up inside your testing platform

Preview 02:02

Configure the lab virtual machine with the Damn Vulnerable Web Application for use with the course

Preview 02:11
Setup your copy of Burp Suite professional or community as well as your Companion Virtual Machine running the Damn Vulnerable Web Application
Setup your lab environment
1 question

Let's quickly go over everything you've learned so far before moving further, good luck!

Secrtion 1: Quiz
5 questions
+ Burp Suite Fundamentals
4 lectures 16:53

The first step is making sure your web browser is configured to properly route traffic through Burp Suite.  Learn how to configure your browser to use an interception proxy.

Preview 03:27

Ever started up Burp Suite and wondered just what the heck all those tabs at the top are for?  After watching this you wont have to anymore!

Preview 05:57

This one video solves a simple problem that 90% of all beginners struggle with which is trying to test an application that utilizes HTTPS.

Installing PortSwigger's Root CA Certificate
02:37

Burp Suite projects were introduced with the release of Burp 1.7.  Here is how to create a new project for a new web application penetration test

Creating Your First Burp Suite Project
04:52
+ The Web Application Assessment Methodology
4 lectures 19:30

This is the "secret sauce", the process that hackers use to identify security weaknesses in a web application

Overview of The Methodology
02:27

The first phase is all about identifying user controlled inputs and mapping out the functionality of your target application

Phase 1: Discovery & Mapping
06:27

The next step is to manually tamper with all user controlled input fields while observing the applications behavior and watching for anomalous responses that may result in a potential attack vector

Phase 2: Focused Penetration Testing
07:24

Burp Suite professional has a fantastic automated scanner that you can use to find web-based vulnerabilities even faster!

Phase 3: Scanning & Validation
03:12
+ Advanced Burp Suite Techniques
3 lectures 20:28
Exploiting SQL Injection Part 1
06:36
Exploiting SQL Injection Part 2
09:56
Tunneling Through a SOCKS Proxy
03:56