در حال حاضر محصولی در سبد خرید شما وجود ندارد.
Ethical hackers and penetration testers need a very good toolbox to do their job efficiently. They would also need to learn step-by-step how to use the tools from this toolbox and that’s exactly what this course delivers. In this course, we will demonstrate Sqlmap, which is the most powerful tool for automated SQL injection detection and exploitation. The course will also present Google Hacking and show you how it can be used to find security weaknesses in web applications. Later on in the course, you will be presented with fuzzing, which is a vulnerability detection technique used by many successful hackers, and it will be demonstrated how to perform fuzzing with Burp Suite Intruder. Finally, you will learn how to exploit race conditions with OWASP ZAP. Race conditions can lead to very dangerous attacks on modern web applications, and this is exactly what we will demonstrate at later stages. By the end of this course, you will have worked on the tools used by successful hackers and start using them in your own penetration testing projects going forward.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
Hacking Web Applications via PDFs, Images, and Links
Case Studies of Award-Winning XSS Attacks: Part 2
Start Hacking at HackerOne
Keep Hacking at HackerOne
فیلم یادگیری Web Application Penetration Testing: Input Validation
How Web Hackers Make BIG MONEY: Remote Code Execution
Web Hacking Expert – Full-Stack Exploitation Mastery
فیلم یادگیری Web Application Penetration Testing: Insecure Error Handling
Credential Access with Hashcat
فیلم یادگیری Web Application Penetration Testing: Weak Cryptography