Brief Summary
This course guides you from being a total beginner in ethical hacking to a confident tester. You'll learn to use hacking tools and techniques, understand web security, and apply practical skills in real lab environments. It's all about mastering security while having fun!
Key Points
-
Learn hacking tools and techniques
-
Think like a hacker to protect against them
-
Practical labs based on real-life situations
-
Start from zero knowledge about penetration testing
-
Focus on both theory and practical skills
Learning Outcomes
-
Understand and perform basic penetration testing steps
-
Identify and exploit web application vulnerabilities
-
Gather information on your targets securely
-
Set up a testing lab with necessary tools
-
Understand the OWASP Top Ten vulnerabilities
About This Course
You will learn hacking tools, methodologies and techniques and and learn how to secure them from these hackers.
In order to protect yourself from hackers, you must think as one.
This training is based on a practical approach of day-by-day situations and it contain labs based on real environments.
In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking.
This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine.
The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.
Once you understand how websites work we will start talking about how can we exploit these components. This course will take you from a beginner to a more advanced level -- so you will be able to launch attacks and test the security of websites and web applications, and furthermore you'll be able to help fixing these vulnerabilities and secure websites from them.
Below are the main topics, both theoretical and practical, of this course:
Core problems (Causes. Defences)
Web Technologies (HTTP Protocol, Web Functionality, Encoding)
Mapping (Spidering and Analysing)
Attacking Authentication (Technologies, Flaws, Fixes, Brute Force)
Attacking Session Management (State, Tokens, Flaws)
Attacking Access Controls (Common Vulnerabilities, Attacks)
Attacking Data Stores (SQL Injection, Bypassing Filters, Escalation)
Bypassing Client-Side Controls (Browser Interception, HTML interception, Fixes)
Attacking the server (OS command Injection, Path Traversal, Mail Injection, File Upload)
Attacking Application Logic
Cross Site Scripting
Attacking Users (CSRF, ClickJacking, HTML Injection)
OWASP Top Ten Vulnerabilities
Network Attacks
Labs:
Spidering, Website Analyser
Brute-Force
Session Hijacking via Mann-in-The-Middle
Get Gmail or Facebook Passwords via SSLStrip
SQL Injection
Upload File and Remote Execution
Cross-Site Scripting (Stored + Reflected, Cookie Stealing, Preventing XSS)
CSRF (Change password trough CSRF vuln., Preventing CSRF)
NOTE: This course is created only for educational purposes and all the attacks are launched in an isolated lab environment.
Understand and perform the basic steps in order to performa penetration testing of a web application
Understand web application's security principles and potential dangers
Be able to gather information about your target
Pratap A.
Good