Size: 304 MB

Websites are one of the most vulnerable pieces of technology since their contents are exposed on the internet. By understanding how attackers locate and exploit these vulnerabilities, you can help build more secure websites and applications. This course shows how to perform advanced web testing using Burp Suite, the professional pen testing framework. Instructor Malcolm Shore also introduces other scanning tools, including Whatweb, Dirbuster, DirScanner, DIRB, and Wfuzz, for finding hidden webpages and other nonstandard attack vectors. Once scanning is complete, you can learn how to zero in on vulnerabilities and intercept messages, integrating tools like sqlmap and Nikto. Then find out how to attack a site using uploaded shell files, SQL injection, and login circumvention. Malcolm shares different approaches for JavaScript, PHP, and Jenkins-based sites, as well as techniques for penetrating content management systems such as WordPress and Joomla. By the end of the course, you should be able to gain access to websites and applications, access data from web servers, use command shells, and perform advanced web testing with Burp Suite and other pen testing tools.

Topics include:

  • Identifying websites
  • Busting open websites
  • Enumerating a website
  • Crawling or spidering a website
  • Scanning at scale
  • Finding vulnerabilities with Nikto, Metasploit WMAP, and sqlmap
  • Exploiting Node.js
  • Injecting SQL
  • Using Burp Suite to gain access to accounts
  • Accessing content management systems

HOMEPAGE – https://www.lynda.com/IT-Infrastructure-tutorials/Penetration-Testing-Advanced-Web-Testing/751330-2.html

Download Links-

Note: Comment below if you find any link dead or getting problem in downloading files.

You May Also Like

Windows Privilege Escalation for OSCP & Beyond!
Mobile Security: Reverse Engineer Android Apps From Scratch
Penetration Testing: Advanced Kali Linux
Categories: CoursesSecurity

0 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *