UDEMY
UDEMY Logo

Website Hacking / Penetration Testing & Bug Bounty Hunting 

  • Offered byUDEMY

Website Hacking / Penetration Testing & Bug Bounty Hunting
 at 
UDEMY 
Overview

Upskilling is a better roadmap to success. Enroll in this course to learn critical principles of Ethical Hacking through real-life case studies & examples

Duration

1 hour

Mode of learning

Online

Difficulty level

Beginner

Official Website

Go to Website External Link Icon

Credential

Certificate

Website Hacking / Penetration Testing & Bug Bounty Hunting
 at 
UDEMY 
Highlights

  • Earn a Certificate of completion from Udemy on successful course completion
  • Earn a certificate of learning on course completion
  • Enroll for free
  • Pay only for getting a certificate of completion
  • 9 hours on-demand video
Read more
Details Icon

Website Hacking / Penetration Testing & Bug Bounty Hunting
 at 
UDEMY 
Course details

Skills you will learn
Who should do this course?
  • Anybody interested in learning website & web application hacking / penetration testing
  • Anybody interested in becoming a bug bounty hunter
  • Anybody interested website hacking
  • Anybody interested in learning how to secure websites & web applications from hacker
  • Web developers so they can create secure web application & secure their existing ones
  • Web admins so they can secure their websites
What are the course deliverables?
  • 90+ Videos to take you from a beginner to advanced in website hacking
  • Create a hacking lab & needed software (on Windows, OS X and Linux)
  • Become a bug bounty hunters & discover bug bounty bugs!
  • Discover, exploit and mitigate a number of dangerous web vulnerabilities
  • Exploit these vulnerabilities to hack into web servers
  • Bypass security & advanced exploitation of these vulnerabilities
  • Advanced post exploitation - hack other websites on the same server, dump the database, privilege escalation....etc
  • Bypass security & filters
  • Intercept requests using a proxy
  • Adopt SQL queries to discover and exploit SQL injections in secure pages
  • Gain full control over target server using SQL injections.
More about this course
  • This course is highly practical but it won't neglect the theory, first you'll learn how to install the needed software (on Windows, Linux and Mac OS X) and then we'll start with websites basics, the different components that make a website, the technologies used, and then we'll dive into website hacking straight away. From here onwards you'll learn everything by example, by discovering vulnerabilities and exploiting them to hack into websites, so we'll never have any dry boring theoretical lectures
  • Before jumping into hacking, you'll first learn how to gather comprehensive information about the target website, then the course is divided into a number of sections, each section covers how to discover, exploit and mitigate a common web application vulnerability, for each vulnerability you will first learn the basic exploitation, then you will learn advanced techniques to bypass security, escalate your privileges, access the database, and even use the hacked websites to hack into other websites on the same server.
Read more

Website Hacking / Penetration Testing & Bug Bounty Hunting
 at 
UDEMY 
Curriculum

Course Introduction

Lab Overview & Needed Software

Installing Kali Linux as a VM on Windows

Installing Kali Linux as a VM on Apple Mac OS

Installing Kali Linux as a VM on Apple M1 Computers

Installing Kali Linux as a VM on Linux

Installing Metasploitable As a Virtual Machine

Basic Overview Of Kali Linux

The Linux Terminal & Basic Linux Commands

Configuring Metasploitable & Lab Network Settings

What is a Website?

How To Hack a Website ?

Gathering Information Using Whois Lookup

Discovering Technologies Used On The Website

Gathering Comprehensive DNS Information

Discovering Websites On The Same Server

Discovering Subdomains

Discovering Sensitive Files

Analysing Discovered Files

Maltego - Discovering Servers, Domains & Files

How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites

GET & POST Requests

Intercepting Requests

Exploiting Advanced File Upload Vulnerabilities To Hack Websites

[Security] Fixing File Upload Vulnerabilities

Other courses offered by UDEMY

549
50 hours
– / –
3 K
10 hours
– / –
549
4 hours
– / –
599
10 hours
– / –
View Other 2344 CoursesRight Arrow Icon

Website Hacking / Penetration Testing & Bug Bounty Hunting
 at 
UDEMY 
Students Ratings & Reviews

5/5
Verified Icon1 Rating
M
Mitesh Karthik
Website Hacking / Penetration Testing & Bug Bounty Hunting
Offered by UDEMY
5
Other: Overall, I think this was a good course. It gave me insight to the various tools used for hacking and the various methods use to gain access to computer systems. I also like the fact that each situation discus protection against each level. Thank you.
Reviewed on 16 Oct 2020Read More
Thumbs Up IconThumbs Down Icon
View 1 ReviewRight Arrow Icon
qna

Website Hacking / Penetration Testing & Bug Bounty Hunting
 at 
UDEMY 

Student Forum

chatAnything you would want to ask experts?
Write here...