دسته بندی

در حال حاضر محصولی در سبد خرید شما وجود ندارد.

پنل کاربری

رمز خود را فراموش کرده اید؟ اگر اولین بار است از سایت جدید استفاده میکنید باید پسورد خود را ریست نمایید.

کورس یادگیری کامل Website Hacking / Penetration Testing & Bug Bounty Hunting

دانلود Udemy Website Hacking / Penetration Testing & Bug Bounty Hunting

10,900 تومان
بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
افزودن به سبد خرید
خرید دانلودی فوری

در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

با مشاهده این کورس آموزشی از طریق انجام پروژه های واقعی و به زبانی بسیار ساده مطالب فراوانی را در رابطه با هک وب سایت یاد می گیرید.

عنوان اصلی : Website Hacking / Penetration Testing & Bug Bounty Hunting

این مجموعه آموزش ویدیویی محصول موسسه آموزشی Udemy است که بر روی 1 حلقه دیسک ارائه شده و به مدت زمان 9 ساعت و 15 دقیقه در اختیار علاقه مندان قرار می گیرد.

در ادامه با برخی از سرفصل های درسی این مجموعه آموزش آشنا می شویم :


Course Introduction :
Course Introduction

Preparation - Creating a Penetration Testing Lab :
Lab Overview & Needed Software
Installing Kali 2020 As a Virtual Machine Using a Ready Image
Installing Metasploitable As a Virtual Machine
Installing Windows As a Virtual Machine

Preparation - Linux Basics :
Basic Overview Of Kali Linux
The Linux Terminal & Basic Linux Commands
Configuring Metasploitable & Lab Network Settings

Website Basics :
What is a Website?
How To Hack a Website ?

Information Gathering :
Gathering Information Using Whois Lookup
Discovering Technologies Used On The Website
Gathering Comprehensive DNS Information
Discovering Websites On The Same Server
Discovering Subdomains
Discovering Sensitive Files
Analysing Discovered Files
Maltego - Discovering Servers, Domains & Files
Maltego - Discovering Websites, Hosting Provider & Emails

File Upload Vulnerabilities :
How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites
HTTP Requests - GET & POST
Intercepting HTTP Requests
Exploiting Advanced File Upload Vulnerabilities To Hack Websites
Exploiting More Advanced File Upload Vulnerabilities
[Security] Fixing File Upload Vulnerabilities

Code Execution Vulnerabilities :
How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack Websites
Exploiting Advanced Code Execution Vulnerabilities
[Security] - Fixing Code Execution Vulnerabilities

Local File Inclusion Vulnerabilities (LFI) :
What are they? And How To Discover & Exploit Them
Gaining Shell Access From LFI Vulnerabilities - Method 1
Gaining Shell Access From LFI Vulnerabilities - Method 2

Remote File Inclusion Vulnerabilities (RFI) :
Remote File Inclusion Vulnerabilities - Configuring PHP Settings
Remote File Inclusion Vulnerabilities - Discovery & Exploitation
Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites
[Security] Fixing File Inclusion Vulnerabilities

SQL Injection Vulnerabilities :
What is SQL?
Dangers of SQL Injections
SQL Injection Vulnerabilities - SQLi In Login Pages
Discovering SQL Injections In POST
Bypassing Logins Using SQL Injection Vulnerability
Bypassing More Secure Logins Using SQL Injections
[Security] Preventing SQL Injections In Login Pages

SQL injection Vulnerabilities - Extracting Data From The Database :
Discovering SQL Injections in GET
Reading Database Information
Finding Database Tables
Extracting Sensitive Data Such As Passwords

SQL injection Vulnerabilities - Advanced Exploitation :
Discovering & Exploiting Blind SQL Injections
Discovering Complex SQL Injection Vulnerabilities
Exploiting an advanced SQL Injection Vulnerability to Extract Passwords
Bypassing Filters
Bypassing Security & Accessing All Records
[Security] Quick Fix To Prevent SQL Injections
Reading & Writing Files On The Server Using SQL Injections
Getting A Shell & Controlling The Target Server Using an SQL Injection
Discovering SQL Injections & Extracting Data Using SQLmap
Getting a Direct SQL Shell using SQLmap
[Security] - The Right Way To Prevent SQL Injection Vulnerabilites

XSS Vulnerabilities :
Introduction - What is XSS or Cross Site Scripting?
Discovering Basic Reflected XSS
Discovering Advanced Reflected XSS
Discovering An Even More Advanced Reflected XSS
Discovering Stored XSS
Discovering Advanced Stored XSS

XSS Vulnerabilities - Exploitation :
Hooking Victims To BeEF Using Reflected XSS
Hooking Victims To BeEF Using Stored XSS
Interacting With Hooked Targets
Running Basic Commands On Victims
Stealing Credentials/Passwords Using A Fake Login Prompt
Bonus - Installing Veil Framework
Bonus - Veil Overview & Payloads Basics
Bonus - Generating An Undetectable Backdoor Using Veil 3
Bonus - Listening For Incoming Connections
Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10
Gaining Full Control Over Windows Target
[Security] Fixing XSS Vulnerabilities

Insecure Session Management :
Logging In As Admin Without a Password By Manipulating Cookies
Discovering Cross Site Request Forgery Vulnerabilities (CSRF)
Exploiting CSRF To Change Admin Password Using a HTML File
Exploiting CSRF Vulnerabilities To Change Admin Password Using Link
[Security] The Right Way To Prevent CSRF Vulnerabilities
Brute Force & Dictionary Attacks
Introduction to Brute Force & Dictionary Attacks?
Creating a Wordlist
Guessing Login Password Using a Wordlist Attack With Hydra
Discovering Vulnerabilities Automatically Using Owasp ZAP
Scanning Target Website For Vulnerabilities
Analysing Scan Results

Post Exploitation :
Post Exploitation Introduction
Executing System Commands On Hacked Web Servers
Escalating Reverse Shell Access To Weevely Shell
Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc
Bypassing Limited Privileges & Executing Shell Commands
Downloading Files From Target Webserver
Uploading Files To Target Webserver
Getting a Reverse Connection From Weevely
Accessing The Database

Bonus Section:
Bonus Lecture - What's Next?

مشخصات این مجموعه :
زبان آموزش ها انگلیسی روان و ساده
دارای آموزشهای ویدیویی و دسته بندی شده
ارائه شده بر روی 1 حلقه دیسک
مدت زمان آموزش 9 ساعت و 15 دقیقه !
محصول موسسه آموزشی Udemy