وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Complete Web Application Hacking & Penetration Testing

سرفصل های دوره

Hacking web applications, hacking websites, bug bounty & penetration testing in my ethical hacking course to be Hacker


01 - Welcome to Advanced Web Application Penetration Testing
  • 001 What We Covered In This Course
  • 002 Current Issues of Web Security
  • 003 Principles of Testing
  • 004 Types of Security Testing
  • 005 Guidelines for Application Security
  • 006 Laws and Ethic
  • 007 FAQ regarding Ethical Hacking.html
  • 008 FAQ regarding Penetration Testing.html

  • 02 - Setting Up Virtual Lab Environment
  • 001 Requirements and Overview of Lab
  • 002 Installing VMware Workstation Player
  • 003 Installing Kali using the ISO file for VMware - Step 1
  • 004 Installing Kali using the ISO file for VMware - Step 2
  • 005 Installing Kali using the ISO file for VMware - Step 3
  • 006 Installing Vulnerable Virtual Machine BeeBox
  • 007 Connectivity and Snapshots

  • 03 - Bug Bounty
  • 001 Bug Bounty

  • 04 - Modern Web Applications
  • 001 Modern Technology Stack
  • 002 Client-Server Architecture
  • 003 Running a Web Application
  • 004 Core Technologies Web Browsers
  • 005 Core Technologies URL
  • 006 Core Technologies HTML
  • 007 Core Technologies CSS
  • 008 Core Technologies DOM
  • 009 Core Technologies JavaScript
  • 010 Core Technologies HTTP
  • 011 Core Technologies HTTPS and Digital Certificates
  • 012 Core Technologies Session State and Cookies
  • 013 Attack Surfaces
  • 014 Introduction to Burp Downloading, Installing and Running
  • 015 Introduction to Burp Capturing HTTP Traffic and Setting FoxyProxy
  • 016 Introduction to Burp Capturing HTTPS Traffic

  • 05 - Reconnaissance and Discovery
  • 001 Intro to Reconnaissance
  • 002 Extract Domain Registration Information Whois
  • 003 Identifying Hosts or Subdomains Using DNS Fierce & Theharvester
  • 004 TheHarvester Modules that require API keys.html
  • 005 Detect Applications on The Same Service
  • 006 Ports and Services on The Web Server
  • 007 Review TechnologyArchitecture Information
  • 008 Extracting Directory Structure Crawling
  • 009 Minimum Information Principle
  • 010 Using Search Engines Google Hacking

  • 06 - Authentication and Authorization Testing
  • 001 Definition
  • 002 Creating a Password List Crunch
  • 003 Differece Between HTTP and HTTPS Traffic Wireshark
  • 004 Attacking Insecure Login Mechanisms
  • 005 Attacking Insecure Logout Mechanisms
  • 006 Attacking Improper Password Recovery Mechanisms
  • 007 Attacking Insecure CAPTCHA Implementations
  • 008 Path Traversal Directory
  • 009 Path Traversal File
  • 010 Introduction to File Inclusion Vulnerabilities
  • 011 Local File Inclusion Vulnerabilities
  • 012 Remote File Inclusion Vulnerabilities

  • 07 - Session Management Testing
  • 001 Http Only Cookies
  • 002 Secure Cookies
  • 003 Session ID Related Issues
  • 004 Session Fixation
  • 005 Introduction Cross-Site Request Forgery
  • 006 Stealing and Bypassing AntiCSRF Tokens

  • 08 - Input Validation Testing
  • 001 Definition
  • 002 Reflected Cross-Site Scripting Attacks
  • 003 Reflected Cross-Site Scripting over JSON
  • 004 Stored Cross-Site Scripting Attacks
  • 005 DOM Based Cross-Site Scripting Attacks
  • 006 Inband SQL Injection over a Search Form
  • 007 Inband SQL Injection over a Select Form
  • 008 Error-Based SQL Injection over a Login Form
  • 009 SQL Injection over Insert Statement
  • 010 Boolean Based Blind SQL Injection
  • 011 Time Based Blind SQL Injection
  • 012 Detecting and Exploiting SQL Injection with SQLmap
  • 013 Detecting and Exploiting Error Based SQL Injection with SQLmap
  • 014 Detecting and Exploiting Boolean and Time Based Blind SQL Injection with SQLmap
  • 015 Command Injection Introduction
  • 016 Automate Command Injection Attacks Commix
  • 017 XMLXPATH Injection
  • 018 SMTP Mail Header Injection
  • 019 PHP Code Injection

  • 09 - Testing Cryptography
  • 001 Heartbleed Attack
  • 002 Attacking HTML5 Insecure Local Storage

  • 10 - Using Known Vulnerable Components
  • 001 Druppal SQL Injection Drupageddon (CVE-2014-3704)
  • 002 SQLite Manager File Inclusion (CVE-2007-1232)
  • 003 SQLite Manager PHP Remote Code Injection
  • 004 SQLite Manager XSS (CVE-2012-5105)

  • 11 - Other Attacks in ethical hacking, certified ethical hacking, Ethical Intelligenc
  • 001 Bypassing Cross Origin Resource Sharing
  • 002 XML External Entity Attack
  • 003 Attacking Unrestricted File Upload Mechanisms
  • 004 Server-Side Request Forgery

  • 12 - Extra
  • 001 Complete Web Application Hacking & Penetration Testing.html
  • 179,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 26769
    حجم: 3200 مگابایت
    مدت زمان: 542 دقیقه
    تاریخ انتشار: ۲۶ آذر ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    179,000 تومان
    افزودن به سبد خرید