Course Curriculum
- 13 sections
- 61 lectures
- 14 hours, 18 minutes total length
-
About The Course00:03:00
-
Web Attack Simulation Lab00:12:00
-
Web application technologies 101 – PDF00:47:00
-
HTTP Protocol Basics00:11:00
-
Encoding Schemes00:13:00
-
Same Origin Policy – SOP00:06:00
-
HTTP Cookies00:11:00
-
Cross-origin resource sharing00:05:00
-
Web application proxy – Burp suite00:09:00
-
Fingerprinting web server00:05:00
-
DNS Analysis – Enumerating subdomains00:04:00
-
Metasploit for web application attacks00:12:00
-
Web technologies analysis in real time00:03:00
-
Outdated web application to server takeover00:08:00
-
BruteForcing Web applications00:06:00
-
Shodan HQ00:07:00
-
Harvesting the data00:05:00
-
Finding link of target with Maltego CE00:09:00
-
Cross Site Scripting- XSS – PDF00:34:00
-
Cross site scripting00:07:00
-
Reflected XSS00:14:00
-
Persistent XSS00:11:00
-
DOM-based XSS00:10:00
-
Website defacement through XSS00:09:00
-
XML Documents & database00:14:00
-
Generating XSS attack payloads00:13:00
-
XSS in PHP, ASP & JS Code review00:13:00
-
Cookie stealing through XSS00:12:00
-
Advanced XSS phishing attacks00:08:00
-
Advanced XSS with BeEF attacks00:10:00
-
Advanced XSS attacks with Burp suite00:08:00
-
Code Review Guide03:11:00
-
SQL Injection attacks – PDF00:45:00
-
Introduction to SQL Injection00:16:00
-
Dangers of SQL Injection00:05:00
-
Hunting for SQL Injection vulnerabilities00:20:00
-
In-band SQL Injection attacks00:27:00
-
Blind SQL Injection attack in-action00:10:00
-
Exploiting SQL injection – SQLMap00:09:00
-
Fuzzing for SQL Injection – Burp Intruder00:14:00
-
CSRF or XSRF attack methods00:12:00
-
Anti-CSRF Token methods00:15:00
-
Anti-CSRF token stealing-NOT easy00:11:00
-
Authentication bypass-hydra00:11:00
-
HTTP Verb Tampering00:09:00
-
HTTP parameter pollution – HPP00:06:00
-
Authentication00:10:00
-
Client side control bypass00:10:00
-
LFI & RFI attacks00:13:00
-
Unrestricted file upload – content type00:06:00
-
Unrestricted File Upload – Extension Type00:06:00
-
Remote code execution using Shell Uploads00:09:00
-
XXE attacks in action00:14:00
-
Advanced Intruder attack types00:23:00
-
Cross window messaging00:02:00
-
Defense in depth applied to web app00:02:00
-
Drupagedden00:02:00
-
Finding details with open source00:17:00
-
Out of band XXE00:02:00
-
Website auditing00:02:00
-
Claim Your Certificate