Learn Website Hacking Penetration Testing From Scratch
Learn how to hack websites and web applications and learn how to secure them from these hackers.
If you are interested in learning website & web application hacking / penetration testing, want to learn how to secure websites & web applications from hacker this comprehensive course on Website & Web applications Hacking.
Focus of this course is on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn:
- How to set up a lab and install needed software to practice penetration testing on your own machine.
- What is a website,
- How does it work,
- What does it rely on,
- What do mean by a web server, a database, and
- How all of these components work together to give us functioning websites,
From a beginner to a more advanced level — by the time you finish, you’ll be able to fix vulnerabilities and secure websites from hackers. Following are the III Sections of this course
- Information Gathering –
- How to gather information about your target website
- How to discover the DNS server used, the services, subdomains, un-published directories, sensitive files, user emails, websites on the same server and even the web hosting provider. This information is crucial as it increases the chances of being able to successfully gain access to the target website.
- Discovering, Exploiting & Fixing –
- Discover, exploit and fix a large number of vulnerabilities
- Bypass security measurements
- File upload
- Code Execution
- Local File inclusion
- Remote File inclusion
- SQL Injection
- XSS
- Insecure Session Management
- Brute Force & Dictionary Attacks
- Post Exploitation –
- Learn what can you do with the access you gained from exploiting the above vulnerabilities,
- How to convert reverse shell access to a Weevely access and vice versa, you will also learn
- How to run system commands on the target server, navigate between directories, access other websites on the same server, upload/download files, access the database and even download the whole database to your local machine and
- How to bypass security and do all of that even if you did not have permissions to do that!
All the attacks in this course are practical attacks that work against any real websites, in each vulnerability you will learn the basic exploitation, then you will learn advanced methods that will give you more privileges or allow you to bypass security measurements — You will learn how and why these vulnerabilities are exploitable, how to fix them and what are the right practices to avoidcasing them.
NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.
Keypoints of your learning:
- Install windows & vulnerable operating systems as virtual machines for testing
- Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections
- Bypass filtering, and login as admin without password using SQL injections
- Hack into hooked computers and gain full control over them
- Fix XSS vulnerabilities & protect yourself from them as a user
- What do we mean by brute force & wordlist attacks
- Bypass security measurements
- Access all websites on the same webserver
- Connect to the database and execute SQL queries or download the whole database to the local machine
- Discover servers, technologies and services used on target website
- Set up a lab environment to practice hacking
- Install Kali Linux – a penetration testing operating system
- Learn linux commands and how to interact with the terminal
- Run javascript code on hooked victims
- Learn linux basics
- Understand how websites & web applications work
- Gather sensitive information about websites
- Adopt SQL queries to discover and exploit SQL injections in more secure pages
- Bypass filtering and security measurements
- Create a wordlist or a dictionary
- Launch a wordlist attack and guess admin’s password
- Discover all of the above vulnerabilities automatically using a web proxy
- Run system commands on the target webserver
- Understand how browsers communicate with websites
- Discover, exploit and fix file upload vulnerabilities
- Access the file system (navigate between directories, read/write files)
- Download, upload files
- Find all subdomains associated with a website
- Discover unpublished directories and files associated with a target website
- Find all websites hosted on the same server as the target website
- Exploit advanced file upload vulnerabilities & gain full control over the target website
- Intercepting requests using a proxy
- Discover, exploit and fix code execution vulnerabilities
- Exploit advanced code execution vulnerabilities & gain full control over the target website
- Discover, exploit & fix local file inclusion vulnerabilities
- Exploit advanced local file inclusion vulnerabilities & gain full control over the target website
- Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website
- Discover, fix, and exploit SQL injection vulnerabilities
- Bypass login forms and login as admin using SQL injections
- Discover & exploit blind SQL injections
- Read / Write files to the server using SQL injections
- Gain full control over the target server using SQL injections
- Discover emails and sensitive data associated with a specific website
- Patch SQL injections quickly
- Learn the right way to write SQL queries to prevent SQL injections
- How to use BeEF framework
- Discover basic & advanced stored XSS vulnerabilities
- Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities
- Discover DOM-based XSS vulnerabilities
- Create an undetectable backdoor
- Discover basic & advanced reflected XSS vulnerabilities
- Steal credentials from hooked victims
Curriculum
- 18 Sections
- 93 Lessons
- 52 Weeks
- 1. Preparation Creating a Penetration Testing Lab4
- 2. Preparation - Linux Basics3
- 3. Website Basics2
- 4. Information Gathering9
- 4.1Gathering information Using Whois Lookup4 Minutes
- 4.2Discovering Technologies Used on the website6 Minutes
- 4.3Gathering Comprehensive DNS Information3 Minutes
- 4.4Discovering Websites On The Same Server5 Minutes
- 4.5Discovering Subdomains5 Minutes
- 4.6Discovering Sensitive Files7 Minutes
- 4.7Analyzing Discovered Files4 Minutes
- 4.8Maltego Discovering Servers, Domains and Files7 Minutes
- 4.9Maltego – Discovering Websites, Hosting Provider & Emails4 Minutes
- 5. File Upload Vulnerabilities6
- 5.1What are they? How to discover and Exploit Basic File Upload Vulnerabilities6 Minutes
- 5.2HTTP Requests GET and POST4 Minutes
- 5.3Intercepting HTTP Requests6 Minutes
- 5.4Exploiting Advanced File Upload Vulnerabilities4 Minutes
- 5.5Exploiting More Advanced File upload Vulnerabilities4 Minutes
- 5.6[Security] Fixing File Upload Vulnerabilities6 Minutes
- 6. Code Execution Vulnerabilities3
- 7. Local File Inclusion Vulnerabilities (LFI)3
- 8. Remote File Inclusion Vulnerabilities (RFI)4
- 9. SQL Injection Vulnerabilities2
- 10. SQL Injection Vulnerabilities - SQLi In Login Pages4
- 11. SQL injection Vulnerabilities - Extracting Data From The Database4
- 12. SQL injection Vulnerabilities - Advanced Exploitation11
- 12.1Discovering & Exploiting Blind SQL Injections5 Minutes
- 12.2Discovering a More Complicated SQL Injection7 Minutes
- 12.3Extracting Data (passwords) By Exploiting a More Difficult SQL Injection4 Minutes
- 12.4Bypassing Filters4 Minutes
- 12.5Bypassing Security & Accessing All Records7 Minutes
- 12.6[Security] Quick Fix To Prevent SQL Injections7 Minutes
- 12.7Reading & Writing Files On The Server Using SQL Injection Vulnerability6 Minutes
- 12.8Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server5 Minutes
- 12.9Discovering SQL Injections & Extracting Data Using SQLmap6 Minutes
- 12.10Getting a Direct SQL Shell using SQLmap4 Minutes
- 12.11[Security] – The Right Way To Prevent SQL Injection2 Minutes
- 13. XSS Vulnerabilities7
- 13.1Introduction – What is XSS or Cross Site Scripting?3 Minutes
- 13.2Discovering Basic Reflected XSS3 Minutes
- 13.3Discovering Advanced Reflected XSS4 Minutes
- 13.4Discovering An Even More Advanced Reflected XSS7 Minutes
- 13.5Discovering Stored XSS2 Minutes
- 13.6Discovering Advanced Stored XSS3 Minutes
- 13.7Discovering Dom Based XSS6 Minutes
- 14. XSS Vulnerabilities - Exploitation12
- 14.1Hooking Victims To BeEF Using Reflected XSS5 Minutes
- 14.2Hooking Victims To BeEF Using Stored XSS4 Minutes
- 14.3BeEF – Interacting With Hooked Victims3 Minutes
- 14.4BeEF – Running Basic Commands On Victims4 Minutes
- 14.5BeEF – Stealing Credentials/Passwords Using A Fake Login Prompt2 Minutes
- 14.6Bonus – Installing Veil 37 Minutes
- 14.7Bonus – Veil Overview & Payloads Basics7 Minutes
- 14.8Bonus – Generating An Undetectable Backdoor Using Veil 39 Minutes
- 14.9Bonus – Listening For Incoming Connections7 Minutes
- 14.10Bonus – Using A Basic Delivery Method To Test The Backdoor & Hack Windows 107 Minutes
- 14.11BeEF – Gaining Full Control Over Windows Target3 Minutes
- 14.12[Security] Fixing XSS Vulnerabilities7 Minutes
- 15. Insecure Session Management5
- 15.1Logging In As Admin Without a Password By Manipulating Cookies6 Minutes
- 15.2Discovering Cross Site Request Forgery Vulnerabilities (CSRF)6 Minutes
- 15.3Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File7 Minutes
- 15.4Exploiting CSRF Vulnerabilities To Change Admin Password Using Link5 Minutes
- 15.5[Security] The Right Way To Prevent CSRF Vulnerabilities9 Minutes
- 16. Brute Force & Dictionary Attacks3
- 17. Discovering Vulnerabilities Automatically Using Owasp ZAP2
- 18. Post Exploitation9
- 18.1Post Exploitation Introduction3 Minutes
- 18.2Interacting With The Reverse Shell Access Obtained In Previous Lectures6 Minutes
- 18.3Escalating Reverse Shell Access To Weevely Shell7 Minutes
- 18.4Weevely Basics – Accessing Other Websites, Running Shell Commands …etc4 Minutes
- 18.5Bypassing Limited Privileges & Executing Shell Commands4 Minutes
- 18.6Downloading Files From Target Webserver4 Minutes
- 18.7Uploading Files To Target Webserver7 Minutes
- 18.8Getting a Reverse Connection From Weevely7 Minutes
- 18.9Accessing The Database8 Minutes
Ethical Hacker, Pen-tester & Computer Scientist
I am an ethical hacker, a computer scientist, and the founder and CTO of zSecurity. I studied PC Science in University College Dublin & graduated in 2016.
I have a superb revel in ethical hacking, I commenced making video tutorials back in 2009 in a moral hacking community (iSecuri1ty), and I additionally labored as a pen-tester for the identical enterprise. In 2013 I started out teaching my first direction on line in Arabic, this path acquired wonderful comments which prompted me to create an English version of this course.
The English course became the most famous and the top paid path, this prompted me to make more publications on moral hacking, now I have plenty of courses on ethical hacking and more than 200,000 students enrolled on exclusive teaching structures.
Courses you might be interested in
-
15 Lessons
-
10 Lessons
-
13 Lessons
-
39 Lessons