Website Hacking in Practice
3.5 (70 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6,010 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Website Hacking in Practice to your Wishlist.

Add to Wishlist

Website Hacking in Practice

Ethical hacking training is dedicated to programmers and website administrators. Website security unleashed
3.5 (70 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6,010 students enrolled
Last updated 10/2015
English
Current price: $10 Original price: $100 Discount: 90% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 3 hours on-demand video
  • 24 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
Lectures in PDF + Live Video Training
TOP 10 web app. and website related hacking techniques
IT security essentials
ZIP package with all the source codes and examples
21 important techniques
Video sessions transcript of every module
View Curriculum
Requirements
  • basic IT knowledge
  • Basic Microsoft Windows knowledge
Description

LAST UPDATED: FEBRUARY 2017

Ethical Hacking Course: Website Hacking in Practice Training course - finally published!

Welcome to Hacking School: Website Hacking in Practice course!

Before we begin – the practical use of the training you are going to see has been proven by vast group of people – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, black- and white hat hackers. Please, read carefully what we'd like to share with you.

The course covers all important hacking techniques used by hackers and system administrators. About the Ethical Hacking Training course (what you can expect):

  • It is a step by step training on Website and Web-application ethical hacking and security.
  • It covers almost all of the Top 10 Most Critical Web Application Attacks presented yearly by OWASP organization (Open Web Application Security Project) + 10 common techniques / vulnerabilities more.
  • It can be treated as a valuable source of knowledge for any white hat hacker, web developer, system administrator or IT security consultant.
  • You will learn how to hack using 21 interesting techniques and see how each of them can be used in a practical real-life example.
  • You will get access to all the lectures in PDF format and live Ethical Hacking Video Training sessions you can watch on-line.
  • Every lecture also contains a video session transcript with screen shots - you can print it and use it during your training.
  • Finally you will be provided with all the source codes and examples shown in the course. You can simply download the zip package from our server.


WHAT YOU WILL LEARN in this Ethical Hacking Training:

  • Module 01. Introduction and environment configuration - you will learn how to configure and prepare your system for the further training. All you need is a Windows system.
  • Module 02. Deep data hiding.
  • Module 03. Brute-force and dictionary attacks - you will get to know how an attacker could perform a brute-force or a dictionar attack on your website or web application containing a password protected data.
  • Module 04. Account lockout attack.
  • Module 05. Web parameter tampering - you will learn how to tamper hidden data used by websites. You will use the presented technique in a real-life example. Very important lesson.
  • Module 06. Path and information disclosure.
  • Module 07. Forced browsing - you will see how an attacker could "sniff" a sensitive data from a website using a forced browsing.
  • Module 08. Path traversal - you will learn a path traversal method and use it in practice in your training environment.
  • Module 09. Unicode encoding - encoding related vulnerabilities.
  • Module 10. Parameter delimiter - you will learn how to take advantage of input filtering bugs. After this lesson you will be able to create an admin account - of course without having the administrator privileges.
  • Module 11. PHP injection - you will be demonstrated a PHP code injection practical attack. Very important lesson. You will see how a malicious data can be injected into a website, e.g. using a crafted image or text string.
  • Module 12. Direct static code injection - you will learn what a ststic code injection is and how it could be used by an attacker.
  • Module 13. SQL injection - one of the TOP3 techniques used by attackers nowadays. Step by step practical demonstration. You can hack the training website yourself (without harming anybody).
  • Module 14. XSS - Cross Site Scripting attack - you will see for yourself why XSS is considered the most popular hackers' target. By the end on this lesson you will intercept a user session.
  • Module 14B. XST - Cross Site Tracing attack.
  • Module 15. XSRF - Cross Site Request Forgery attack - you will learn how an attacker can force an unaware user to reset a password.
  • Module 16. Spying on data with a browser - no additional comment needed.
  • Module 17. Session hijacking - lesson on session hijacking and consequences.
  • Module 18. Session fixation.
  • Module 19. Phishing - one of the most popular attacks. You will learn some tips to protect against it.
  • Module 20. Automated security testing - you will be taught using automated security testing tools and learn what white, black and grey box testing is. Useful knowledge for web developers and IT security consultants.


IN EACH MODULE YOU WILL ALSO SEE HOW YOU CAN PROTECT YOUR WEBSITE OR WEB APPLICATION AGAINST EVERY VULNERABILITY DESCRIBED IN THE COURSE. MODULES ARE DIVIDED INTO: 1) THEORETICAL INTRODUCTION, 2) PRACTICAL ATTACK EXAMPLE, 3) SECURITY GUIDANCE.


WHAT YOU NEED TO KNOW BEFORE YOU BEGIN:

  • This ethical hacking course is intended to help you regardless of your current knowledge and skills. All you need is a basic computer knowledge and a Windows system.
  • We will show you how to prepare your training environment. In this environment you can experiment freely, without doing harm to anybody.
  • All the modules were recorded in Windows 7 (from the attacker / victim point of view) but it doesn't mean that the presented techniques apply only to Windows. Most of them are OS independent.
  • You will download the ZIP package with all the source codes and examples from our server before you begin to avoid unnecessary code retyping.
  • Every module (lesson) contains the attack related part, as well as a guidance to protect your own website, web application or web server.


What you will find inside can also be used by beginners - thanks to live Video Training attached to the course. Almost every module covered inside has been presented by a professional web developer.


Please be advised that all the techniques presented in "Website Hacking in Practice" course can only be used ethically and in your own testing / researching environment. Note that you will get all the required tools and information to prepare your own training system. Please see the Legal information in the 1st section for further legal reference.


We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the "Website Hacking in Practice" training is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, we will give you full refund. No questions asked.

We wish you the best,
The Hacking School Team

Who is the target audience?
  • web / app developers
  • system admins
  • IT sec professionals
  • everyone interested in hacking
  • ethical hackers
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 44 Lectures Collapse All 44 Lectures 07:23:28
+
Introduction
2 Lectures 00:00

Legal information
6 pages
+
Environment setup and training system configuration
2 Lectures 22:37
Module 01. Introduction - Download ZIP package with source codes and examples
14 pages

+
Basic techniques
6 Lectures 28:28
Module 02. Deep data hiding
6 pages

Module 02. Deep data hiding - Video Training
05:00

Module 03. Brute-force and dictionary attacks
15 pages

Module 03. Brute-force and dictionary attacks - Video Training
14:23

Module 04. Account lockout attack
8 pages

Module 04. Account lockout attack - Video Training
09:05
+
Lets get deeper - data leaks
11 Lectures 34:25
Module 05. Web parameter tampering
9 pages

Module 05. Web parameter tampering - Video Training
03:38

Module 06. Path and information disclosure
10 pages

Module 06. Path and information disclosure - Video Training
10:51

Module 07. Forced browsing
5 pages

Module 07. Forced browsing - Video Training
04:38

Module 08. Path traversal
9 pages

Module 08. Path traversal - Video Training
07:19

Module 09. Unicode encoding
3 pages

Module 10. Parameter delimiter
9 pages

Module 10. Parameter delimiter - Video Training
07:59
+
Incjection attacks
6 Lectures 36:23
Module 11. PHP injection
10 pages

Module 11. PHP injection - Video Training
09:21

Module 12. Direct static code injection
9 pages

Module 12. Direct static code injection - Video Training
08:23

Module 13. SQL injection
24 pages

Module 13. SQL injection - Video Training
18:39
+
XSS related attacks
6 Lectures 24:03
Module 14. XSS - Cross Site Scripting attack
14 pages

Module 14. XSS - Cross Site Scripting attack - Video Training
10:44

Module 14B. XST - Cross Site Tracing attack
11 pages

Module 14B. XST - Cross Site Tracing attack - Video Training
05:30

Module 15. XSRF - Cross Site Request Forgery attack
14 pages

Module 15. XSRF - Cross Site Request Forgery attack - Video Training
07:49
+
More advanced techniques
6 Lectures 18:17
Module 16. Spying on data with a browser
14 pages

Module 16. Spying on data with a browser - Video Training
07:27

Module 17. Session hijacking
7 pages

Module 17. Session hijacking - Video Training
06:07

Module 18. Session fixation
9 pages

Module 18. Session fixation - Video Training
04:43
+
Phishing
2 Lectures 07:18
Module 19. Phishing
27 pages

Module 19. Phishing - Video Training
07:18
+
Security testing in practice
2 Lectures 10:57
Module 20. Automated security testing
14 pages

Module 20. Automated security testing - Video Training
10:57
+
Summary
1 Lecture 00:00
Summary and references
5 pages
About the Instructor
Hacking School
4.0 Average rating
1,695 Reviews
62,308 Students
13 Courses
IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

IT Security Academy
4.1 Average rating
1,972 Reviews
68,168 Students
24 Courses
IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.