Web Application Hacking

Learn the art of Application Hacking to safeguard your application from being hacked. Build to be an Ethical Hacker!!
3.9 (22 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
187 students enrolled
$19
$20
5% off
Take This Course
  • Lectures 49
  • Length 8.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2015 English

Course Description


This is an excellent course on learning the art of Web Application Hacking a.k.a Web Application Penetration testing (WAPT). It focuses on preparing the students /developers /auditors to face the real world of Web Application Penetration testing while helping them safeguard their company's applications, data and reputation.

This Course starts from teaching you the basics of any attack and then moving onto substantiating it with pure technical skills. It is designed to cover all the latest attacks of Web Application like Web Attacks, Web Services, Flash Attacks, Injection attacks and many more at an affordable price for all the ethical hacking enthusiasts.

The highlights of this course include:

  • Learning the basic of Web Application Hacking
  • Learning how to exploit and defend real-world web apps
  • Learning to setup your own vulnerable test application for learning to hack and crack
  • Understanding concepts with beautiful diagrams, illustrations and demonstrations
  • Tracking your progress with the tricky quizzes

Be Safe Keep Safe!!

What are the requirements?

  • The Students need to have basic knowledge of web applications.

What am I going to get from this course?

  • The Students will be able test/identify security vulnerabilities in their application and take appropriate decisions to safeguard their applications

What is the target audience?

  • This course is for Students looking to build a successful career in Ethical Hacking.
  • This course is for developers looking to safeguard their applications.
  • This is also for the security auditors who have to audit the application from security perspective

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
Introduction to Web Application Penetration Testing
Preview
16:57
Web Application Information Gathering
14:03
Basics of HTTP Request / Response
15:22
Introduction to BURP Suite Proxy Tool
15:37
Quiz - Introduction to HTTP
3 questions
Section 2: Setting up Sample Test Application
DVWA Application Installation Guide
6 pages
Installation of Mutillidae II application
6 pages
Section 3: Introduction to Web Application Session Management
Web Application Cookies
14:02
Web Session Management attacks
10:57
Session Management
3 questions
Section 4: Clickjacking Attacks
Introduction to Clickjacking Attacks
10:28
Testing for Clickjacking Attacks
04:56
Quiz - Clickjacking
1 question
Section 5: Cross Site Scripting Attacks
Basics of Cross Site Scripting Attacks
Preview
12:28
Reflected Cross Site Scripting
05:43
Stored Cross Site Scripting
02:59
Mitigating Cross Site Scripting Attacks
08:48
DOM Based Cross Site Scripting Attack
09:57
Quiz - Cross Site Scripting
2 questions
Section 6: Flash Based Attacks
Introduction to Flash Applications
07:52
Setting up a Vulnerable Flash application
2 pages
De-compiling Flash Applications
10:13
Cross Site Scripting in Flash Applications
05:31
Cross Site Flashing in Flash Applications
07:30
HTML Injection in Flash Applications
11:19
Phishing Attacks through Flash Applications
10:31
Impact Analysis & Mitigating Flash Attacks
05:21
Section 7: XPath Injection Attacks
XPATH Basics
15:55
XPATH Injection
18:34
Section 8: XSLT Injection
XSLT Basics
07:30
XSLT Injection
17:56
Section 9: XML Attacks
XML Basics
09:23
XML CDATA Injection
03:56
XML External Entity Injection
07:04
XML Entity Expansion Attack
08:36
Quiz - XML Injection
2 questions
Section 10: Web Service Attacks
Web Service Basics
11:40
Web Services Attacks
06:51
Web Service Clients Tutorial
13:50
Web Services - SQL Injection
06:33
Web Services - Command Injection
06:23
Web Service - SOAP Array DOS Attack
04:16
Web Service - SOAPAction Header Manipulation Attack
06:57
Section 11: SQL Injection Attacks
SQL - Basic Concepts
08:44
SQL Injection - Introduction
26:46
SQL Injection - Union Based Exploitation
17:54
SQL Injection Boolean Based Exploitation
17:31
SQL Injection Time Based Exploitation
07:41
SQL Injection Mitigation
05:21
SQL Injection Quiz
3 questions
Section 12: Cross Site Request Forgery (CSRF) Attacks
Introduction to CSRF Attacks
14:55
Testing for CSRF Attacks
18:04
Quiz - Cross Site request Forgery
2 questions
Section 13: Some Extras!!!!!
Keyloggers and Virtual Keyboards
09:18
File Inclusion Attacks
16:13
OS Command Injection
16:41

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Manjunath Venkatraman, Trainer for IT and System Audits

I have 10+ years of experience in carrying out system audit, process audit, access control, risk analysis and Training. Conducted multiple training programme for teams involved in IT enabled services implementation in large organisation. I have contributed to development of training material , process documentation and implementation of measures and system checks to plug security risks.

With my experience in working on IT Risk assessment and mitigation, and realizing the urgent need for creating expertise in the field of application security, vulnerability testing and ethical hacking, these training modules have been designed . I have worked closely with vastly experienced professionals working in large size MNC IT companies to develop these modules. Both amateurs and professions seeking to gain expertise in these fields will find these modules quite interesting, informative and educative.

Ready to start learning?
Take This Course