THE PERFECT $10 SALE IS FINALLY HERE! Avail upto 90% OFFView Offer
  • Sign In
  • Registration

Learn How To Hack Sites Like A Black Hat Hacker & How To Protect Them Like A White Hat Hacker

Learn website hacking and penetration testing tutorial from scratch

Price : $189.99

Coming Soon
Wishlist
Compare

15-Days

Money Back

Access

lifetime

9 Hours

Hours

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. As you gain a complex understanding of websites, you will then learn how you can exploit them to carry out a number of powerful cyber attacks. You’ll track from a beginning to advanced level and by the time you finish you’ll be able to launch attacks and test the security of websites and apps the same way that black hat hackers would, and be able to fix these vulnerabilities.

  • Access 93 lectures & 9 hours of content 24/7
  • Learn how to gather information about your target site like discovering the DNS server used & subdomains
  • Discover, exploit, & fix a number of vulnerabilities like file upload, code execution, SQL injection, XSS, & much more
  • Understand what you can do w/ the access gained from vulnerabilities
  • Explore the basic exploitation of attacks & the advanced methods to enhance them
  • Learn how & why vulnerabilities are exploitable, how to fix them, & the right practices to avoid them

 

    Rating 4.5 (50 Reviews)

  • Course Outline
  • Introduction
    • Course Introduction 
  • First Section
    • Lab Overview & Needed Software 
    • Option 1 - Installing Kali Linux As a Virtual Machine Using a Ready Image
    • Option 2 - Installing Kali Using ISO 
    • Installing Metasploitable As a Virtual Machine 
    • Installing Windows As a Virtual Machine
  • Preparation - Linux Basics
    • Basic Overview Of Kali Linux 
    • The Linux Terminal & Basic Linux Commands
    • Configuring Metasploitable & Lab Network Settings 
  • Website Basics
    • What is a Website? 
    • How To Hack a Website ?
  • Information Gathering
    • Gathering Information Using Whois Lookup
    • Discovering Technologies Used On The Website
    • Gathering Comprehensive DNS Information 
    • Discovering Websites On The Same Server 
    • Discovering Subdomains 
    • Discovering Sensitive Files 
    • Analysing Discovered Files 
    • Maltego - Discovering Servers, Domains & Files
    • Maltego - Discovering Websites, Hosting Provider & Emails
  • File Upload Vulnerabilities
    • What are they? And How To Discover & Exploit Basic File Upload Vulnerabilites
    • HTTP Requests - GET & POST 
    • Intercepting HTTP Requests
    • Exploiting Advanced File Upload Vulnerabilities
    • Exploiting More Advanced File Upload Vulnerabilities
    • [Security] Fixing File Upload Vulnerabilities
  • Code Execution Vulnerabilities
    • What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities
    • Exploiting Advanced Code Execution Vulnerabilities 
    • [Security] - Fixing Code Execution Vulnerabilities
  • Local File Inclusion Vulnerabilities (LFI)
    • What are they? And How To Discover & Exploit Them 
    • Gaining Shell Access From LFI Vulnerabilities - Method 1
    • Gaining Shell Access From LFI Vulnerabilities - Method 2 
  • Remote File Inclusion Vulnerabilities (RFI)
    • Remote File Inclusion Vulnerabilities - Configuring PHP Settings
    • Remote File Inclusion Vulnerabilities - Discovery & Exploitation
    • Exploiting Advanced Remote File Inclusion Vulnerabilities 
    • [Security] Fixing File Inclusion Vulnerabilities
  • SQL Injection Vulnerabilities
    • What is SQL (5:48)
    • Dangers of SQL Injections 
  • SQL Injection Vulnerabilities - SQLi In Login Pages
    • Discovering SQL Injections In POST
    • Bypassing Logins Using SQL Injection Vulnerability
    • Bypassing More Secure Logins Using SQL Injections 
    • [Security] Preventing SQL Injections In Login Pages
  • SQL injection Vulnerabilities - Extracting Data From The Database
    • Discovering SQL Injections in GET 
    • Reading Database Information 
    • Finding Database Tables
    • Extracting Sensitive Data Such As Passwords


//