Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Giveaway [Udemy] hacking/Website Hacking/ Penetration Testing &Bounty Hunting
#1
hacking/Website Hacking/ Penetration Testing &Bounty Hunting | Udemy

Quote:Requirements
No Linux, programming or hacking knowledge required.
Computer with a minimum of 4GB ram/memory.
Operating System: Windows / OS X / Linux.
Description
Discovery, Exploitation & Mitigation - In this section you will learn how to discover, exploit and mitigate a large number of vulnerabilities, this section is divided into a number of sub-sections, each covering a specific vulnerability, firstly you will learn what is that vulnerability and what does it allow us to do, then you will learn how to exploit this vulnerability and bypass security, and finally we will analyse the code causing this vulnerability and see how to fix it, the following vulnerabilities are covered in the course:
File upload - This vulnerability allow attackers to upload executable files on the target web server, exploiting these vulnerabilities properly gives you full control over the target website.
Code Execution - This vulnerability allow users to execute system code on the target web server, this can be used to execute malicious code and get a reverse shell access which gives the attacker full control over the target web server.
Local File Inclusion - This vulnerability can be used to read any file on the target server, so it can be exploited to read sensitive files, we will not stop at that though, you will learn two methods to exploit this vulnerability to get a reverse shell connection which gives you full control over the target web server.
Remote File Inclusion - This vulnerability can be used to load remote files, exploiting this vulnerability properly gives you full control over the target web server.
SQL Injection - This is one of the most dangerous vulnerabilities, it is everywhere and can be exploited to do all of the things the above vulnerabilities allow us to do and more, so it allows you to login as admin without knowing the password, access the database and get all data stored there such as usernames, passwords, credit cards ....etc, read/write files and even get a reverse shell access which gives you full control over the target server!
Cross Site Scripting (XSS) - This vulnerability can be used to inject javascript code in vulnerable pages, we won't stop at that, you will learn how to steal credentials from users (such as facebook or youtube passwords) and even gain full access to their computer.
Insecure Session Management - In this section you will learn how to exploit insecure session management in web applications and login to other user accounts without knowing their password, you'll also learn how to discover and exploit CSRF (Cross Site Request Forgery) vulnerabilities to force users to change their password, or submit any request you want.
This course includes:
10.5 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of completion

https://www.udemy.com/course/hackingwebs...FC73847F35
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Giveaway [Udemy] The Ultimate Ethical Hacking, Linux and Metasploit Training baziroll 0 471 01-13-2022 , 10:45 PM
Last Post: baziroll
  Giveaway [Udemy] Ethical Hacking Masterclass : From Zero to Binary Deep baziroll 0 675 10-01-2021 , 05:40 PM
Last Post: baziroll
  Giveaway [Udemy ] Ultimate Ethical Hacking and Penetration Testing (UEH) baziroll 5 1,349 09-24-2021 , 09:07 PM
Last Post: baziroll
  Giveaway [Udemy ] Pentesting and Securing Web Applications (Ethical Hacking) baziroll 4 970 09-15-2021 , 01:26 PM
Last Post: baziroll
  Giveaway [Udemy] Ultimate Ethical Hacking Course baziroll 0 413 09-09-2021 , 11:30 AM
Last Post: baziroll

Forum Jump:


Users browsing this thread: 1 Guest(s)