Practical Penetration Testing Skills Hands On Labs





Published 4/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.40 GB | Duration: 4h 27m

Web Application Penetration test


What you'll learn
Fundamentals of Web Application
Web Application development
Web Application pentesting
Web Application Security
Requirements
No programming experience needed. You will learn everything you need to know
Description
Cybersecurity professionals use a variety of tactics to ensure the safety of sensitive information. Penetration testing is one way they evaluate the computer systems they monitor.Penetration testing is a series of processes and techniques that simulate a real cyberattack. The ultimate goal is to identify security vulnerabilities in an organization's databases, networks, and devices. Penetration tests are carried out by people known as ethical hackers, who understand how real hackers think and what they're after. These ethical hackers may work on staff at a company or as external consultants.To better understand the point of penetration testing, consider this example: An organization deploys a new human resources software that lets remote workers track their work schedule and request time off from home. The organization may hire a penetration tester to ensure this new service doesn't create any unexpected entry points for cyber attackers. This process ultimately helps the organization keep company and customer data secure.Penetration is hacking, but it's authorized hacking. Pen testers receive a signed contract from the client called a statement of work, that outlines what they are allowed to do, and gives them permission to carry out the penetration test. Without authorization, breaking into an organization's environment is illegal.
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Fundamentals of Web Application
Lecture 2 HTTP Pentesting
Lecture 3 Web Application Same Origin
Lecture 4 Web Application Proxies
Section 3: Information Gathering
Lecture 5 Information Gathering Techniques
Lecture 6 Enumerating Resources
Lecture 7 Fingerprint Web Application
Lecture 8 Enumerating Resources
Lecture 9 Finding Hidden Files With Dirbuster
Section 4: Cross Site Scripting
Lecture 10 Reflected XSS and Persistant XSS
Lecture 11 DOM XSS
Lecture 12 BEEF XSS
Section 5: SQL Injections
Lecture 13 SQL Injection Fundamentals
Lecture 14 Testing for SQL Injection
Lecture 15 In-Band SQL Injections
Lecture 16 Error-Based SQL Injection
Lecture 17 Blind SQL Injections
Lecture 18 SQLMap
Section 6: Authentication and Authorization
Lecture 19 Users Enumeration
Lecture 20 Common Vulnerabilities
Section 7: Session Security
Lecture 21 Session attack
Lecture 22 Cross Site Request Forgery (CSRF)
Section 8: Web application attacks
Lecture 23 Flash Vulnerabilities and Security
Lecture 24 CORS Prevention Cheat Sheet
Lecture 25 File Inclusion Vulnerabilities
Lecture 26 Other Attacks
Lecture 27 Web Services
Lecture 28 XPath Injection
Beginner cyber security

Screenshots


rapidgator.net:
Kod:
https://rapidgator.net/file/d950124e9f74b45a37c554e3ffc7f6d7/zgskf.Practical.Penetration.Testing.Skills.Hands.On.Labs.part1.rar.html
https://rapidgator.net/file/f6da2327d2da7633fef4a1790bc4ded1/zgskf.Practical.Penetration.Testing.Skills.Hands.On.Labs.part2.rar.html
https://rapidgator.net/file/84f61046d463f5b2e9e5a6605c09a52e/zgskf.Practical.Penetration.Testing.Skills.Hands.On.Labs.part3.rar.html
nitroflare.com:
Kod:
https://nitroflare.com/view/A4990CD6FA92471/zgskf.Practical.Penetration.Testing.Skills.Hands.On.Labs.part1.rar
https://nitroflare.com/view/FDABEC905894A52/zgskf.Practical.Penetration.Testing.Skills.Hands.On.Labs.part2.rar
https://nitroflare.com/view/FC638B243807665/zgskf.Practical.Penetration.Testing.Skills.Hands.On.Labs.part3.rar