Jump to content
SJeeXplore

Recommended Posts

Posted
File Name:   Website Hacking / Penetration Testing
Content Source:   https://www.udemy.com/course/learn-website-hacking-penetration-testing-from-scratch/
Genre / Category:   Premium courses
Download : DOWNLOAD FROM MEGA
Price:   $89.99
Language:

ENGLISH

 

For Paid User Without URL Shortener:

 

Download :
To view hidden content, you need to:
Register or Sign in to your account!

 

ABOUT THE COURSE:-

Welcome to my comprehensive course on Website hacking / penetration testing. This course assumes you have NO prior knowledge in hacking, it starts with you from scratch and takes you step-by-step to an advanced level, being able to hack websites like black-hat hackers and secure them like security experts!

 

This course is highly practical but doesn't neglect the theory, we'll start with basics to teach you how websites work  and install the needed software (on Windows, Linux and Apple Mac OS). Then we'll start hacking straight away. You'll learn everything by example, by discovering vulnerabilities and exploiting them to hack websites. No boring dry lectures

 

Before jumping into hacking, you'll first learn how to gather comprehensive information about the target website. Then the course is divided into a number of sections, each aims to teach you a common vulnerability from the OWASP top 10 most common security threats. Each section takes you through a number of hands-on examples to teach you the cause of the security bug or vulnerability and how to discover it and exploit it in a number of scenarios, from simple to advanced, ultimately allowing you to hack the target website. You'll also learn advanced techniques to bypass filters and security, escalate your privileges, access the database and much more post-exploitation techniques.  As we do this I will also introduce you to different hacking and security concepts, tools and techniques. Everything will be taught through examples and hands-on practicals, there will be no useless or boring lectures!

 

Here's a more detailed breakdown of the course content:

1. Information Gathering - In this section you'll learn how to gather comprehensive information about a target website, you'll learn how to discover its DNS information, the services used, subdomains, un-published directories, sensitive files, user emails, websites on the same server and even the hosting provider. This information is crucial as it expands the attack surface, increasing our changes of successfully hacking the target website.

 

2. Discovery, Exploitation & Mitigation - In this section you will learn how to discover, exploit and mitigate a common vulnerabilities from the OWASP top 10 most common security threats. This section is divided into a number of subsections. Each subsection takes you through a number of hands-on examples to teach you the cause of the vulnerability, how to discover it and how to exploit it in a number of scenarios, from simple to advanced, ultimately allowing you to hack the target website. You'll also learn advanced techniques to bypass filters and security. Finally we will analyse the code causing these vulnerabilities and d,

Here's a list of the main vulnerabilities that will be covered in this section.

    • Information Disclosure.

    • File upload.

    • Code Execution.

    • Local File Inclusion.

    • Remote File Inclusion.

    • SQL Injection.

    • Cross Site Scripting (XSS).

    • Insecure Session Management.

    • Brute Force & Dictionary Attacks.

    • CSRF (Client-Side Request Forgery).

 

3. Post Exploitation In this section you will learn what can you do with the access you gained by exploiting the above vulnerabilities. You will learn how to convert reverse shell access to a Weevely access and vice versa,  how to execute system commands on the target server, navigate between directories, access other websites on the same server, upload/download files, access the database and even download the whole database to your local machine. You will also learn how to bypass security, privilege escalation and do all of the above with limited permissions on the server ! 

 

You'll use the following tools to achieve the above:

  • Kali Linux.

  • Weevely.

  • THC-Hydra .

  • Netcat .

  • Dev tools.

  • Burp Suite.

  • OWASP Zap.

  • Metasploit.

  • BeEF.

  • Dirb.

  • Maltego.

  • Knockpy.

 

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...