وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Complete Web Application Hacking & Penetration Testing

سرفصل های دوره

Hacking web applications, hacking websites, bug bounty & penetration testing in my ethical hacking course to be Hacker


01 - Welcome to Advanced Web Application Penetration Testing
  • 001 What We Covered In This Course
  • 002 Current Issues of Web Security
  • 003 Principles of Testing
  • 004 Types of Security Testing
  • 005 Guidelines for Application Security
  • 006 Laws and Ethic
  • 007 FAQ regarding Ethical Hacking.html
  • 008 FAQ regarding Penetration Testing.html

  • 02 - Setting Up Virtual Lab Environment
  • 001 Requirements and Overview of Lab
  • 002 Installing VMware Workstation Player
  • 003 Installing Kali using the ISO file for VMware - Step 1
  • 004 Installing Kali using the ISO file for VMware - Step 2
  • 005 Installing Kali using the ISO file for VMware - Step 3
  • 006 Installing Vulnerable Virtual Machine BeeBox
  • 007 Connectivity and Snapshots

  • 03 - Bug Bounty
  • 001 Bug Bounty

  • 04 - Modern Web Applications
  • 001 Modern Technology Stack
  • 002 Client-Server Architecture
  • 003 Running a Web Application
  • 004 Core Technologies Web Browsers
  • 005 Core Technologies URL
  • 006 Core Technologies HTML
  • 007 Core Technologies CSS
  • 008 Core Technologies DOM
  • 009 Core Technologies JavaScript
  • 010 Core Technologies HTTP
  • 011 Core Technologies HTTPS and Digital Certificates
  • 012 Core Technologies Session State and Cookies
  • 013 Attack Surfaces
  • 014 Introduction to Burp Downloading, Installing and Running
  • 015 Introduction to Burp Capturing HTTP Traffic and Setting FoxyProxy
  • 016 Introduction to Burp Capturing HTTPS Traffic

  • 05 - Reconnaissance and Discovery
  • 001 Intro to Reconnaissance
  • 002 Extract Domain Registration Information Whois
  • 003 Identifying Hosts or Subdomains Using DNS Fierce & Theharvester
  • 004 TheHarvester Modules that require API keys.html
  • 005 Detect Applications on The Same Service
  • 006 Ports and Services on The Web Server
  • 007 Review TechnologyArchitecture Information
  • 008 Extracting Directory Structure Crawling
  • 009 Minimum Information Principle
  • 010 Using Search Engines Google Hacking

  • 06 - Authentication and Authorization Testing
  • 001 Definition
  • 002 Creating a Password List Crunch
  • 003 Differece Between HTTP and HTTPS Traffic Wireshark
  • 004 Attacking Insecure Login Mechanisms
  • 005 Attacking Insecure Logout Mechanisms
  • 006 Attacking Improper Password Recovery Mechanisms
  • 007 Attacking Insecure CAPTCHA Implementations
  • 008 Path Traversal Directory
  • 009 Path Traversal File
  • 010 Introduction to File Inclusion Vulnerabilities
  • 011 Local File Inclusion Vulnerabilities
  • 012 Remote File Inclusion Vulnerabilities

  • 07 - Session Management Testing
  • 001 Http Only Cookies
  • 002 Secure Cookies
  • 003 Session ID Related Issues
  • 004 Session Fixation
  • 005 Introduction Cross-Site Request Forgery
  • 006 Stealing and Bypassing AntiCSRF Tokens

  • 08 - Input Validation Testing
  • 001 Definition
  • 002 Reflected Cross-Site Scripting Attacks
  • 003 Reflected Cross-Site Scripting over JSON
  • 004 Stored Cross-Site Scripting Attacks
  • 005 DOM Based Cross-Site Scripting Attacks
  • 006 Inband SQL Injection over a Search Form
  • 007 Inband SQL Injection over a Select Form
  • 008 Error-Based SQL Injection over a Login Form
  • 009 SQL Injection over Insert Statement
  • 010 Boolean Based Blind SQL Injection
  • 011 Time Based Blind SQL Injection
  • 012 Detecting and Exploiting SQL Injection with SQLmap
  • 013 Detecting and Exploiting Error Based SQL Injection with SQLmap
  • 014 Detecting and Exploiting Boolean and Time Based Blind SQL Injection with SQLmap
  • 015 Command Injection Introduction
  • 016 Automate Command Injection Attacks Commix
  • 017 XMLXPATH Injection
  • 018 SMTP Mail Header Injection
  • 019 PHP Code Injection

  • 09 - Testing Cryptography
  • 001 Heartbleed Attack
  • 002 Attacking HTML5 Insecure Local Storage

  • 10 - Using Known Vulnerable Components
  • 001 Druppal SQL Injection Drupageddon (CVE-2014-3704)
  • 002 SQLite Manager File Inclusion (CVE-2007-1232)
  • 003 SQLite Manager PHP Remote Code Injection
  • 004 SQLite Manager XSS (CVE-2012-5105)

  • 11 - Other Attacks in ethical hacking, certified ethical hacking, Ethical Intelligenc
  • 001 Bypassing Cross Origin Resource Sharing
  • 002 XML External Entity Attack
  • 003 Attacking Unrestricted File Upload Mechanisms
  • 004 Server-Side Request Forgery

  • 12 - Extra
  • 001 Complete Web Application Hacking & Penetration Testing.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 26769
    حجم: 3200 مگابایت
    مدت زمان: 542 دقیقه
    تاریخ انتشار: 26 آذر 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید