In this video from our Web app attacks and API hacking online course your instructor, Mukul, will show you the functionalities of the Optiva framework and Jboss-related vulnerabilities. It's one more tool under your belt, watch the video and grab it!
The Internet is full of so many web applications, and no product is 100% perfect. Companies perform functional testing and stress testing to make sure they operate smoothly, but to ensure they are safe and secure you need security testing, through pentests and vulnerability assessments. This course is all about Web Application Penetration Testing and finding security holes in those applications.Through concepts, tools, and lots of practice you will train to find them and use them to make applications more secure. You will be able to use that knowledge in your everyday job, or utilize it to participate in bug bounty programs!
During the course, we will solve some CTF and other challenges available online as a bonus.
In the first module of the course:
In order to move along with the instructor, it is necessary for everyone to be on the same page. Therefore, setting up the lab and its usage is important. We will also have an overview of OWASP Top 10 and the OWASP Testing Guide to set the foundation for practical testing in later modules.
Covered topics:
- Kali Linux installation/ova file import
- Importing the vulnerable machine prepared by the instructor
- Setting up Burp Suite
- OWASP Top 10 Overview
- OWASP Testing Guide
- HTTP and HTTPS for web application pentests
- Setting up Burp and Zap to work against HTTPS and HTTP communication
- Testing for HTTP methods
- Response headers and what they mean
- Testing using Burp and testing using Zap in practice
- Differences between Burp and Zap
- Combining Burp Community Edition and Zap to get results as if you were using Burp Pro
- Google Dorking to find vulnerable domains instantly. Combining the dorks with tools to provide a better and faster result.
- Wayback machine
- All the different tools and techniques for finding subdomains
Course toolbox:
Burp Suite Community Edition, ZAP, HUD, Kali Linux, gobuster, dirbuster, fuzzdb, metasploit, skipfish, nikto, wfuzz, sqlmap, nmap, whatweb, sparta, hydra, arjun, BeEF, Wapiti, Amass, Sublist3r, Knockpy, Eyewitness, Wayback machine, Google Dorks, RedHawk, galileo, blackwidow, xssstrike, wascanm, optiva framework,, rapidscan, fuxploider, paramspider, jexboss, w3af, tidos framework, and more!
[custom-related-posts title="Related Posts" none_text="None found" order_by="title" order="ASC"]
Author
- BlogMarch 28, 2022Footprinting Firewalls | Reconnaissance Tutorial [FREE COURSE CONTENT]
- BlogMarch 17, 2022Process Hollowing Malware | Reverse Engineering Tutorial [FREE COURSE CONTENT]
- BlogMarch 9, 2022Sniffing BLE packets | IoT Hacking Tutorial [FREE COURSE CONTENT]
- BlogFebruary 18, 2022Pass The Hash Attacks in Active Directory [FREE COURSE CONTENT]