Website Hacking & Penetration Testing (Real World Hacking!)
4.1 (628 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
8,811 students enrolled

Website Hacking & Penetration Testing (Real World Hacking!)

Practice Web Applications Hacking & Penetration Testing against a number of real world web applications/websites.
4.1 (628 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
8,811 students enrolled
Last updated 12/2019
English, Portuguese, 1 more
  • Turkish
Current price: $118.99 Original price: $169.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 2 hours on-demand video
  • 3 articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Set Up a Lab Environment To Practice Hacking and Penetration Testing.
  • Understand How Websites / web applications Work.
  • Detect What Technologies / Scripts A Website Is Using.
  • Intercepting HTTP Requests Using A Personal Proxy.
  • Collect Sensitive Information About The Target.
  • Web Applications Hacking / Websites Hacking.
  • TOP 10 Web Applications / Websites Vulnerabilities and Website Related Hacking Techniques.
  • Discover and Exploit Cross Site Scripting (XSS) Vulnerabilities.
  • Detect and Exploit Cross Site Request Forgery (CSRF) Vulnerabilities.
  • Discover and Exploit Command Execution Vulnerabilities.
  • Uncover and Exploit SQL Injection Vulnerabilities.
  • Uncover and Exploit Script Source Code Disclosure Vulnerabilities.
  • Using Burp Suite Proxy.
  • How To Use Vega (Web App / website Vulnerability Scanner) to Scan Websites.
  • How To Use Arachni (Web Vulnerability Scanner) to Scan Websites.
  • Answers to all of your questions about ethical hacking and penetration testing!
  • Get A Job As A Penetration Tester / Ethical Hacker & Make Money Online As A Freelancer.
  • The Ability To Hack And Pen Test Any Website / web application.
  • Learn About The different fields of Web Applications Hacking.
  • Basic Information Technology Skills.
  • A Desire To Learn.
  • Basic Knowledge Of Web Applications (not mandatory).
  • Hacking Operating Systems: KALI LINUX, PARROT SECURITY OS, BACKBOX LINUX...etc
  • No previous hacking knowledge required.

This course includes all necessary information to start your carrier in Cyber Security field. This course aims to teach you how to perform full penetration testing on web applications.

JOIN OVER 8000 STUDENTS IN THE Website Hacking & Penetration Testing (Real World Hacking!) COURSE


  • Web applications hacking course is not like other courses. I will not teach you the boring hacking stuff that you can get from Google

  • All the videos in this course are simpleshort and practical

  • You will practice web applications Hacking / Penetration Testing against a number of real-world web applications.

  • You will learn how to discover Web Applications vulnerabilities through Penetration Testing

  • You will learn how to hack the web security.

I will start by teaching you the basics of any vulnerability and then exploiting it with pure technical skills. The web applications hacking and penetration testing course is designed to cover all the latest vulnerabilities of Web Applications like Web Applications Attacks, CSRF attacks, Injection attacks and many more.

In this course, we will answer the following questions:

How do hackers hack websites?

The Best Ways to Hack a Website.

How to Hack a Web Application?

In this course, you will learn the following:

Hacking a website database.

Hacking a website using sql injection.

Website hacking by php source code.

Website hacking exploits.

Website ethical hacking.

Website ethical hacking tools.

Website hacking techniques.

Ethical hacking tools.

The ethical hacking process.

Ethical hacking basics.

OWASP top 10.

*This Course Is For Educational Purposes Only*

------Don't be evil------

Student reviews:


I like the way the instructor is explaining the course. As of now I am happy with the contents and support I am receiving for my queries. This is one of the best courses on Udemy! ★★★★★


Very good course, enjoying it so far. the instructor is, helpful, clear and direct to the point with practical tutorials.★★★★★


Excellent course! The Course was amazing. I learned a lot of things about ethical hacking and the instructor was awesome. I think that the course is definitely worth way more than it's asking price. ★★★★★



Who this course is for:
  • Penetration testers
  • Web developers
  • IT admins and staff
  • Anyone who wants to learn websites / web applications hacking
Course content
Expand all 36 lectures 02:02:50
+ Introduction
3 lectures 03:38

A critical XSS vulnerability has been discovered by me in a well-known company in Australia. The flaw allowed me to hack their payment system.

Preview 01:35
+ Basics
1 lecture 02:25

How web applications work

How Websites work?
+ Preperation
8 lectures 17:36
Install XAMPP & DVWA
Install Burp Suite Proxy
Configure Burp Suite Proxy
Make Burp Suite Capture SSL Traffic
Install Vega Scanner
Setting the DVWA Security Level
+ Information Gathering
3 lectures 12:04
Getting Domain Information
Identify Technology & Software On Websites
Finding Subdomains
+ Cross Site Scripting (XSS)
3 lectures 09:02
Cross Site Scripting (XSS) Explained
Stored Cross Site Scripting (XSS) Vulnerability
Reflected Cross Site Scripting (XSS) Vulnerability
+ Cross Site Request Forgery (CSRF)
2 lectures 07:19
Cross Site Request Forgery (CSRF) Explained
Cross Site Request Forgery (CSRF) Vulnerability
+ SQL Injection
2 lectures 05:53
SQL Injection Explained
SQL Injection Vulnerability
+ Command Execution
2 lectures 05:26
Command Execution Explained
Command Execution Vulnerability
+ File Upload
2 lectures 09:38
File Upload Vulnerability
How to Generate Web Backdoors (Shells)?
+ Brute Force Attack
3 lectures 21:57
Brute Force a Login Page
Create Word lists for Password Cracking
Real World Brute Force Attack