Course Description
Want to know how to hack a website and fix vulnerabilities in computer systems and networks? Are you a web administrator or developer who wants to secure your website? This Learn Website Hacking From Scratch is ideal for those who have little or no knowledge of website hacking, and want an introductory guide to this topic.
In this website hacking and penetration testing course for beginners, you’ll start with learning the basics of how to exploit and mitigate websites and web applications, moving on to more advanced techniques, where topics covered include bypassing security, accessing databases, SQL injection and cross-site scripting (XSS). You’ll also familiarise with the Linux operating system and BeEf web browser attacking framework.
On course completion, you’ll have the practical skills and knowledge to exploit networks like an attacker. Enrol in this Learn Website Hacking From Scratch today and start hacking systems like the experts!
What you’ll learn
- Install hacking lab & needed software (works on Windows, OS X and Linux).
- Discover, exploit and mitigate a number of dangerous vulnerabilities.
- Use advanced techniques to discover and exploit these vulnerabilities.
- Bypass security measurements and escalate privileges.
- Intercept requests using a proxy.
- Hack all websites on same server.
- Bypass filters and client-side security
- Adopt SQL queries to discover and exploit SQL injections in secure pages
- Gain full control over target server using SQL injections
- Discover & exploit blind SQL injections
- Install Kali Linux – a penetration testing operating system
- Install windows & vulnerable operating systems as virtual machines for testing
- Learn linux commands and how to interact with the terminal
- Learn linux basics
- Understand how websites & web applications work
- Understand how browsers communicate with websites
- Gather sensitive information about websites
- Discover servers, technologies and services used on target website
- Discover emails and sensitive data associated with a specific website
- Find all subdomains associated with a website
- Discover unpublished directories and files associated with a target website
- Find all websites hosted on the same server as the target website
- Discover, exploit and fix file upload vulnerabilities
- Exploit advanced file upload vulnerabilities & gain full control over the target website
- Discover, exploit and fix code execution vulnerabilities
- Exploit advanced code execution vulnerabilities & gain full control over the target website
- Discover, exploit & fix local file inclusion vulnerabilities
- Exploit advanced local file inclusion vulnerabilities & gain full control over the target website
- Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website
- Discover, fix, and exploit SQL injection vulnerabilities
- Bypass login forms and login as admin using SQL injections
- Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections
- Bypass filtering, and login as admin without password using SQL injections
- Bypass filtering and security measurements
- Read / Write files to the server using SQL injections
- Patch SQL injections quickly
- Learn the right way to write SQL queries to prevent SQL injections
- Discover basic & advanced reflected XSS vulnerabilities
- Discover basic & advanced stored XSS vulnerabilities
- Discover DOM-based XSS vulnerabilities
- How to use BeEF framwork
- Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities
- Steal credentials from hooked victims
- Run javascript code on hooked victims
- Create an undetectable backdoor
- Hack into hooked computers and gain full control over them
- Fix XSS vulnerabilities & protect yourself from them as a user
- What do we mean by brute force & wordlist attacks
- Create a wordlist or a dictionary
- Launch a wordlist attack and guess admin’s password
- Discover all of the above vulnerabilities automatically using a web proxy
- Run system commands on the target webserver
- Access the file system (navigate between directories, read/write files)
- Download, upload files
- Bypass security measurements
- Access all websites on the same webserver
- Connect to the database and execute SQL queries or download the whole database to the local machine
Requirements
- Basic IT Skills
- No Linux, programming or hacking knowledge required.
- Computer with a minimum of 4GB ram/memory
- Operating System: Windows / OS X / Linux
Who this course is for:
- Anybody who is interested in learning website & web application hacking / penetration testing
- Anybody who wants to learn how hackers hack websites
- Anybody who wants to learn how to secure websites & web applications from hacker
- Web developers so they can create secure web application & secure their existing ones
- Web admins so they can secure their websites
-
Course Introduction00:02:00
-
Lab Overview & Needed Software00:08:00
-
Installing Kali 2019 As a Virtual Machine Using a Ready Image00:10:00
-
Installing Kali 2019 As a Virtual Machine00:10:00
-
Installing Metasploitable As a Virtual Machine00:04:00
-
Basic Overview of Kali Linux00:05:00
-
The Linux Terminal & Basic Linux Commands00:11:00
-
Configuring Metasploitable & Lab Network Settings00:06:00
-
What is a Website?00:04:00
-
How To Hack a Website?00:04:00
-
Gathering Information Using Whois Lookup00:05:00
-
Discovering Technologies Used On The Website00:06:00
-
Gathering Comprehensive DNS Information00:10:00
-
Discovering Websites On The Same Server00:04:00
-
Discovering Subdomains00:05:00
-
Discovering Sensitive Files00:07:00
-
Analysing Discovered Files00:04:00
-
Maltego – Discovering Servers, Domains & Files00:08:00
-
Maltego – Discovering Websites, Hosting Provider & Emails00:05:00
-
What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities00:07:00
-
HTTP Requests – GET & POST00:04:00
-
Intercepting HTTP Requests00:07:00
-
Exploiting Advanced File Upload Vulnerabilities00:05:00
-
Exploiting More Advanced File Upload Vulnerabilities00:04:00
-
[Security] Fixing File Upload Vulnerabilities00:06:00
-
What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities00:07:00
-
Exploiting Advanced Code Execution Vulnerabilities00:06:00
-
[Security] – Fixing Code Execution Vulnerabilities00:06:00
-
What are they? And How To Discover & Exploit Them00:06:00
-
Gaining Shell Access From LFI Vulnerabilities – Method 100:07:00
-
Gaining Shell Access From LFI Vulnerabilities – Method 200:11:00
-
Remote File Inclusion Vulnerabilities – Configuring PHP Settings00:04:00
-
Remote File Inclusion Vulnerabilities – Discovery & Exploitation00:06:00
-
Exploiting Advanced Remote File Inclusion Vulnerabilities00:03:00
-
[Security] Fixing File Inclusion Vulnerabilities00:06:00
-
What is SQL00:06:00
-
Dangers of SQL Injections00:03:00
-
Discovering SQL Injections In POST00:08:00
-
Bypassing Logins Using SQL Injection Vulnerability00:05:00
-
Bypassing More Secure Logins Using SQL Injections00:06:00
-
[Security] Preventing SQL Injections In Login Pages00:08:00
-
Discovering SQL Injections in GET00:07:00
-
Reading Database Information00:05:00
-
Finding Database Tables00:04:00
-
Extracting Sensitive Data Such As Passwords00:04:00
-
Discovering & Exploiting Blind SQL Injections00:06:00
-
Discovering a More Complicated SQL Injection00:07:00
-
Extracting Data (passwords) By Exploiting a More Difficult SQL Injection00:05:00
-
Bypassing Filters00:05:00
-
Bypassing Security & Accessing All Records00:09:00
-
[Security] Quick Fix To Prevent SQL Injections00:07:00
-
Reading & Writing Files On The Server Using SQL Injection Vulnerability00:06:00
-
Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server00:08:00
-
Discovering SQL Injections & Extracting Data Using SQLmap00:07:00
-
[Security] – The Right Way To Prevent SQL Injection00:05:00
-
Introduction – What is XSS or Cross Site Scripting?00:03:00
-
Discovering Basic Reflected XSS00:04:00
-
Discovering Advanced Reflected XSS00:05:00
-
Discovering An Even More Advanced Reflected XSS00:07:00
-
Discovering Stored XSS00:03:00
-
Discovering Advanced Stored XSS00:04:00
-
Hooking Victims To BeEF Using Reflected XSS00:06:00
-
Hooking Victims To BeEF Using Stored XSS00:04:00
-
BeEF – Interacting With Hooked Victims00:04:00
-
BeEF – Running Basic Commands On Victims00:04:00
-
BeEF – Stealing Credentials/Passwords Using A Fake Login Prompt00:02:00
-
Bonus – Installing Veil 3.100:06:00
-
Bonus – Veil Overview & Payloads Basics00:07:00
-
Bonus – Generating An Undetectable Backdoor Using Veil 300:10:00
-
Bonus – Listening For Incoming Connections00:07:00
-
Bonus – Using A Basic Delivery Method To Test The Backdoor & Hack Windows 1000:07:00
-
BeEF – Gaining Full Control Over Windows Target00:04:00
-
[Security] Fixing XSS Vulnerabilities00:07:00
-
Logging In As Admin Without a Password By Manipulating Cookies00:06:00
-
Discovering Cross Site Request Forgery Vulnerabilities (CSRF)00:07:00
-
Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File00:07:00
-
Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview)00:06:00
-
[Security] The Right Way To Prevent CSRF Vulnerabilities00:09:00
-
What Are Brute Force & Dictionary Attacks?00:04:00
-
Creating a Wordlist00:07:00
-
Launching a Wordlist Attack & Guessing Login Password Using Hydra00:14:00
-
Scanning Target Website For Vulnerabilities00:04:00
-
Analysing Scan Results00:04:00
-
Post Exploitation Introduction00:04:00
-
Interacting With The Reverse Shell Access Obtained In Previous Lectures00:07:00
-
Escalating Reverse Shell Access To Weevely Shell00:08:00
-
Weevely Basics – Accessing Other Websites, Running Shell Commands …etc00:07:00
-
Bypassing Limited Privileges & Executing Shell Commands00:05:00
-
Downloading Files From Target Webserver00:05:00
-
Uploading Files To Target Webserver00:08:00
-
Getting a Reverse Connection From Weevely00:08:00
-
Accessing The Database00:09:00
-
Resources – Learn Website Hacking From Scratch
Course Reviews
No Reviews found for this course.