Website Hacking / Penetration Testing & Bug Bounty Hunting
- Offered byUDEMY
Website Hacking / Penetration Testing & Bug Bounty Hunting at UDEMY Overview
Duration | 1 hour |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Go to Website |
Credential | Certificate |
Website Hacking / Penetration Testing & Bug Bounty Hunting at UDEMY Highlights
- Earn a Certificate of completion from Udemy on successful course completion
- Earn a certificate of learning on course completion
- Enroll for free
- Pay only for getting a certificate of completion
- 9 hours on-demand video
Website Hacking / Penetration Testing & Bug Bounty Hunting at UDEMY Course details
- Anybody interested in learning website & web application hacking / penetration testing
- Anybody interested in becoming a bug bounty hunter
- Anybody interested website hacking
- Anybody interested in learning how to secure websites & web applications from hacker
- Web developers so they can create secure web application & secure their existing ones
- Web admins so they can secure their websites
- 90+ Videos to take you from a beginner to advanced in website hacking
- Create a hacking lab & needed software (on Windows, OS X and Linux)
- Become a bug bounty hunters & discover bug bounty bugs!
- Discover, exploit and mitigate a number of dangerous web vulnerabilities
- Exploit these vulnerabilities to hack into web servers
- Bypass security & advanced exploitation of these vulnerabilities
- Advanced post exploitation - hack other websites on the same server, dump the database, privilege escalation....etc
- Bypass security & filters
- Intercept requests using a proxy
- Adopt SQL queries to discover and exploit SQL injections in secure pages
- Gain full control over target server using SQL injections.
- This course is highly practical but it won't neglect the theory, first you'll learn how to install the needed software (on Windows, Linux and Mac OS X) and then we'll start with websites basics, the different components that make a website, the technologies used, and then we'll dive into website hacking straight away. From here onwards you'll learn everything by example, by discovering vulnerabilities and exploiting them to hack into websites, so we'll never have any dry boring theoretical lectures
- Before jumping into hacking, you'll first learn how to gather comprehensive information about the target website, then the course is divided into a number of sections, each section covers how to discover, exploit and mitigate a common web application vulnerability, for each vulnerability you will first learn the basic exploitation, then you will learn advanced techniques to bypass security, escalate your privileges, access the database, and even use the hacked websites to hack into other websites on the same server.
Website Hacking / Penetration Testing & Bug Bounty Hunting at UDEMY Curriculum
Course Introduction
Lab Overview & Needed Software
Installing Kali Linux as a VM on Windows
Installing Kali Linux as a VM on Apple Mac OS
Installing Kali Linux as a VM on Apple M1 Computers
Installing Kali Linux as a VM on Linux
Installing Metasploitable As a Virtual Machine
Basic Overview Of Kali Linux
The Linux Terminal & Basic Linux Commands
Configuring Metasploitable & Lab Network Settings
What is a Website?
How To Hack a Website ?
Gathering Information Using Whois Lookup
Discovering Technologies Used On The Website
Gathering Comprehensive DNS Information
Discovering Websites On The Same Server
Discovering Subdomains
Discovering Sensitive Files
Analysing Discovered Files
Maltego - Discovering Servers, Domains & Files
How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites
GET & POST Requests
Intercepting Requests
Exploiting Advanced File Upload Vulnerabilities To Hack Websites
[Security] Fixing File Upload Vulnerabilities
Other courses offered by UDEMY
Website Hacking / Penetration Testing & Bug Bounty Hunting at UDEMY Students Ratings & Reviews
- 4-51