Learn web application penetration testing from %00
What you'll learn
- You will be able to perform a web penetration testing engagement from start to finish
- You will be able to discover and exploit web application vulnerabilities
- A fairly powerful PC to handle the Kali and the vulnerable virtual machine concurrently, 8 GB of RAM is recommended, a i5 processor
- Knowledge of the HTTP protocol
- Knowledge of Linux, the bash command line
- Dedication, patience and persistence
In this ethical hacking course you'll learn how to exploit the vulnerabilities found in web applications and web servers following the OWASP Testing Guide framework, used by companies all over the world to perform web penetration testing engagements.
A vulnerable virtual machine, Web Sec Target Practice, is provided with the course for you to practice the various phases of the penetration testing assessment.
We'll predominantly use the Burp Suite Community edition and open source Kali tools throughout the entire course to test the infrastructure of the web server, brute force authentication forms, tamper with header attributes, perform XSS, SQL, command injections and other injection variants. We'll also develop a buffer overflow exploit step by step.
Who this course is for:
- Anyone interested in learning web application penetration testing
Amo lo studio ed ho lavorato sia come sviluppatore software che come penetration tester negli ultimi sei anni.
Ho iniziato ad insegnare su Udemy tramite il progetto Prime Radiant Security all'inizio del 2018.
Ho divorato centinaia di videocorsi e libri per tutta la vita, sono qui a condividere un'estensione delle conoscenze nate anche da problemi risolti efficientemente nella vita reale.
Credo che la teoria e la pratica debbano essere scrupolosamente equilibrate per evitare caotici approfondimenti da una parte ed evitare la noia e la frustrazione dall'altra.
I've been studying for a lifetime and have been working as both a software developer and as a penetration tester for the past six years.
I've started teaching through the Prime Radiant Security project at the start of 2018.
I have devoured tons of video courses and books in my life, I'm here to share an extension of the knowledge born out of real life problems I have managed to solve, in the most efficient way possible.
I believe that theory and practice should be carefully balanced in order to avoid further research to understand specific subjects on one hand and to avoid boredom or frustration on the other.