LEE's Web-Hacking 2 ( OWASP ZAP + DVWA + SQLmap )

How to defend The super dangerous web-hacking attacks of the powerful cracking tool !
Free tutorial
Rating: 4.3 out of 5 (31 ratings)
7,070 students
53min of on-demand video
English
English [Auto]

How to defend the extremly critical attack skills from the SQLmap (KALI-Linux's or Win32's cracking tool)

Requirements

  • Web programming Skills [ especially on HTTP / SQL / PHP / HTML / MYSQL / MariaDB / XAMPP ]

Description

Designed for more convenient watching on your smartphone or tablet !

  • What will be added is Metasploit, the ultimate open-source hacking tool.

    And combinaton with search-sploit to help with the hacking tool.

    Also, gathering information, the beginning of all hacking attacks, will be of great importance. So finally, the ultimate scanner called nmap will be added.

    These tools are not used separately. When used together, the ultimate power can be generated.


  • Hacking attack techniques are important, but more importantly, practice them.

    All existing hacking methods can be easily learned on the Internet.

    Unlike them, this content aims to help you test how effectively you can attack in real-life situations.

    Therefore, we will gradually add interesting hacking attack test quizzes.

    --------------------------------------------------------------------------------------------------------------


  • Designed by the IT security-instructor who has the experience on private educational institute and Anti-Cyber-Crime School for the government of South KOREA.

  • The Data Robbers can steal the data from any spots ! (Login / Search / Registering information)

  • The SQL-Injection is world's most famous hacking-skills to the all kinds of web applications.


    ------------------------------------------[ Coming Up ! ]-------------------------------------------------


  • Attacking Services-Vulnerabilities and OWASP TOP 10 Web-Vulnerabilities by using various tools !


  • Nmap (The Port-scanner) + Metasploit (The System-vulnerability-scanner)

    + Metasploitable2 (The Super-vulnerable-linux-server) !

  •  Searchsploit (The powerful DATABASE of exploits)


  • [ Nmap with Scripting(NSE) / Nmap with postgreSQL / Reverse-Backdoor / msfVenom / METERPRETER ]

Who this course is for:

  • Beginners / Professional developers on Web programmings

Instructor

Instructor of IT-security & Game creator
KYOUNG SOO LEE
  • 3.7 Instructor Rating
  • 351 Reviews
  • 39,698 Students
  • 2 Courses

I'm a contents creator and was an instructor for Network Hacking, Web Hacking, Linux web server / Firewall, creating game by Unity3D / Torque2D engine.

I have created the 5 games and published on the Apple-AppStore.

 

[  Hacking / Security  ]

Also, I have experience for teaching for "The Police Cyber Crime Investigation TEAM" in South Korea (Seoul) for "HOW To USE LINUX Firewall" and "HOW To Attack The Web server throughout The Firewall based on RedHat LINUX (iptables & ipchains/Snort/Suricata)" and How to get the Information from the web server and to attack with TCP/UDP Flooding Tools that was created by C-RawSocket in LINUX".


[  Games  ]

And I made iPhone Game and Android Game for Publishing for 5 years.

I have used Unity 4~5 for making mobile games and mobile applications.

And I have taught students and workers who worked at a company for creating games or mobile app or website.

Top companies trust Udemy

Get your team access to Udemy's top 15,000+ courses