Skip to navigation
Skip to navigation
Skip to search form
Skip to login form
Skip to footer
Skip to main content
MVP189
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
PAREPOS
JAVABET99
KONTAN88
PEWE128
LAGA88
SKY99IDN
BUANA88
BOXING55
DEWISRI88
DEWISRI88
DEWISRI88
MVP189
slot mania
MVP189
situs tergacor
pg slot wallet
Accessibility options
Accessibility profiles
Visual impairment
Seizure and epileptic
Color vision deficiency
ADHD
Learning
Content adjustments
Readable font
Highlight titles
Highlight links
Stop animations
Text size
+
+ +
+ + +
Line height
+
+ +
+ + +
Text spacing
+
+ +
+ + +
Color adjustments
Dark contrast
Light contrast
High contrast
High saturation
Low saturation
Monochrome
Orientation adjustments
Reading guide
Reading Mask
Big black cursor
Big white cursor
Email: it@huph.edu.vn
Email: it@huph.edu.vn
Các khóa học
Link list
Đổi giao diện
Giao diện cũ
Giao diện mới
Learning AI
Machine Learning cơ bản
en
English
Technology
Security
Website Hacking Penetration Testing
0 students
Last updated
Mar 2024
Enrol now
Overview
Course content
Instructors
About the course
Show more...
Course content
Sections:
19
•
Activities:
0
•
Resources:
100
Expand all
Section 1
Course Introduction
001-Course Introduction
Section 2
Preparation - Creating a Penetration Testing Lab
002-Lab Overview Needed Software
003-Initial Preparation
004-Installing Kali Linux as a VM on Windows
005-Installing Kali Linux as a VM on Apple Mac OS
006-Installing Kali Linux as a VM on Apple M1 Computers
007-Installing Kali Linux as a VM on Linux
008-Installing Metasploitable As a Virtual Machine
Section 3
Preparation - Linux Basics
009-Basic Overview Of Kali Linux
010-The Linux Terminal Basic Linux Commands
011-Configuring Metasploitable Lab Network Settings
Section 4
Website Basics
012-What is a Website
013-How To Hack a Website
Section 5
Information Gathering
014-Gathering Information Using Whois Lookup
015-Discovering Technologies Used On The Website
016-Gathering Comprehensive DNS Information
017-Discovering Websites On The Same Serve
018-Discovering Subdomains
019-Discovering Sensitive Files
020-Analysing Discovered Files
021-Maltego Discovering Servers Domains Files
022-Maltego Discovering Websites Hosting Provider Emails
Section 6
File Upload Vulnerabilities
023-How To Discover Exploit Basic File Upload Vulnerabilities to Hack Websites
024-GET POST Requests
025-Intercepting Requests
026-Exploiting Advanced File Upload Vulnerabilities To Hack Websites
027-Exploiting More Advanced File Upload Vulnerabilities
028-Security Fixing File Upload Vulnerabilities
Section 7
Code Execution Vulnerabilities
029-How To Discover Exploit Basic Code Execution Vulnerabilities To Hack Websites
030-Exploiting Advanced Code Execution Vulnerabilities
031-Security Fixing Code Execution Vulnerabilities
Section 8
Local File Inclusion Vulnerabilities (LFI)
032-What are they And How To Discover Exploit Them
033-Gaining Shell Access From LFI Vulnerabilities Method 1
034-Gaining Shell Access From LFI Vulnerabilities Method 2
Section 9
Remote File Inclusion Vulnerabilities (RFI)
035-Remote File Inclusion Vulnerabilities Configuring PHP Settings
036-Remote File Inclusion Vulnerabilities Discovery Exploitation
037-Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites
038-Security Fixing File Inclusion Vulnerabilities
Section 10
SQL Injection Vulnerabilities
039-What is SQL
040-Dangers of SQL Injections
Section 11
SQL Injection Vulnerabilities - SQLi In Login Pages
041-Discovering SQL Injections In POST
042-Bypassing Logins Using SQL Injection Vulnerability
043-Bypassing More Secure Logins Using SQL Injections
044-Security Preventing SQL Injections In Login Pages
Section 12
SQL injection Vulnerabilities - Extracting Data From The Database
045-Discovering SQL Injections in GET
046-Reading Database Information
047-Finding Database Tables
048-Extracting Sensitive Data Such As Passwords
Section 13
SQL injection Vulnerabilities - Advanced Exploitation
049-Discovering Exploiting Blind SQL Injections
050-Discovering Complex SQL Injection Vulnerabilities
051-Exploiting an advanced SQL Injection Vulnerability to Extract Passwords
052-Bypassing Filters
053-Bypassing Security Accessing All Records
054-Security Quick Fix To Prevent SQL Injections
055-Reading Writing Files On The Server Using SQL Injections
056-Getting A Shell Controlling The Target Server Using an SQL Injection
057-Discovering SQL Injections Extracting Data Using SQLmap
058-Getting a Direct SQL Shell using SQLmap
059-Security The Right Way To Prevent SQL Injection Vulnerabilites
Section 14
XSS Vulnerabilities
060-Introduction What is XSS or Cross Site Scripting
061-Discovering Basic Reflected XSS
062-Discovering Advanced Reflected XSS
063-Discovering An Even More Advanced Reflected XSS
064-Discovering Stored XSS
065-Discovering Advanced Stored XSS
Section 15
XSS Vulnerabilities - Exploitation
066-Installing Windows As a Virtual Machine
067-Hooking Victims To BeEF Using Reflected XSS
068-Hooking Victims To BeEF Using Stored XSS-
069-Interacting With Hooked Targets
070-Running Basic Commands On Victims
071-Stealing Credentials Passwords Using A Fake Login Prompt
072-Bonus Installing Veil Framework
073-Bonus Veil Overview Payloads Basics
074-Bonus Generating An Undetectable Backdoor Using Veil 3
075-Bonus Listening For Incoming Connections
076-Bonus Using A Basic Delivery Method To Test The Backdoor Hack Windows 10
077-Gaining Full Control Over Windows Target
078-Security Fixing XSS Vulnerabilities
Section 16
Insecure Session Management
079-Logging In As Admin Without a Password By Manipulating Cookies
080-Discovering Cross Site Request Forgery Vulnerabilities CSRF
081-Exploiting CSRF To Change Admin Password Using a HTML File
082-Exploiting CSRF Vulnerabilities To Change Admin Password Using Link
083-Security The Right Way To Prevent CSRF Vulnerabilities
Section 17
Brute Force & Dictionary Attacks
084-Introduction to Brute Force Dictionary Attacks
085-Creating a Wordlist
086-Guessing Login Password Using a Wordlist Attack With Hydra
Section 18
Discovering Vulnerabilities Automatically Using Owasp ZAP
087-Scanning Target Website For Vulnerabilities
088-Analysing Scan Results
Section 19
Post Exploitation
089-Post Exploitation Introduction
090-Executing System Commands On Hacked Web Servers
091-Escalating Reverse Shell Access To Weevely Shell
092-Weevely Basics Accessing Other Websites Running Shell Commands etc
093-Bypassing Limited Privileges Executing Shell Commands
094-Downloading Files From Target Webserve
095-Uploading Files To Target Webserver
096-Getting a Reverse Connection From Weevely
097-Accessing The Database
098-Conclusion
099-Writing a Pentest Report
100-4 Ways to Secure Websites Apps
Instructors
Enrolment options
Website Hacking Penetration Testing
Course modified date:
20 Mar 2024
Enrolled students:
There are no students enrolled in this course.
Guests cannot access this course. Please log in.
Continue
Enrol now
This course includes
Resources
Share this course
Scroll to top
×
Close
×
Close