Details for this torrent 

UDEMY WEBSITE HACKING IN PRACTICE TUTORIAL
Type:
Other > Other
Files:
21
Size:
383.96 MiB (402614433 Bytes)
Uploaded:
2015-06-25 11:17:44 GMT
By:
RandalPaul Trusted
Seeders:
2
Leechers:
0
Comments
1  

Info Hash:
3CF00328BDF2FBA5DB71D76F393B02765221F59A




(Problems with magnets links are fixed by upgrading your torrent client!)
UDEMY WEBSITE HACKING IN PRACTICE TUTORIAL

Welcome to Hacking School: Website Hacking in
Practice course!

Before we begin the practical use of the training you are
going to see has been proven by vast group of people
beginners and computer geeks as well. People who make their first
steps in computer / network security and professionals:
network administrators, programmers, black- and white hat
hackers. Please, read carefully what we'd like to share with
you

The course covers all important hacking techniques
used by hackers and system administrators. About
the Ethical Hacking Training course (what you can
expect):

* It is a step by step training on Website and
Web-application ethical hacking and security
* It covers almost all of the Top 10 Most Critical Web
Application Attacks presented yearly by OWASP organization (Open
Web Application Security Project) + 10 common techniques /
vulnerabilities more
* It can be treated as a valuable source of knowledge for any
white hat hacker, web developer, system administrator or IT
security consultant
* You will learn how to hack using 21 interesting techniques and
see how each of them can be used in a practical
real-life example
* You will get access to all the lectures in PDF
format and live Ethical Hacking Video Training
sessions you can watch on-line
* Every lecture also contains a video session
transcript with screen shots - you can print it
and use it during your training
* Finally you will be provided with all the source codes and
examples shown in the course. You can simply download the zip
package from our server [proxy]

WHAT YOU WILL LEARN in this Ethical Hacking Training:

* Module 01. Introduction and environment
configuration - you will learn how to configure
and prepare your system for the further training
All you need is a Windows system
* Module 02. Deep data hiding
* Module 03. Brute-force and dictionary attacks
you will get to know how an attacker could perform a
brute-force or a dictionar attack on your website or web
application containing a password protected data
* Module 04. Account lockout attack
* Module 05. Web parameter tampering - you will learn how to
tamper hidden data used by websites. You will use the
presented technique in a real-life example. Very important
lesson
* Module 06. Path and information disclosure
* Module 07. Forced browsing - you will see how an
attacker could "sniff" a sensitive data from a
website using a forced browsing
* Module 08. Path traversal - you will learn a path
traversal method and use it in practice in your
training environment
* Module 09. Unicode encoding - encoding related
vulnerabilities
* Module 10. Parameter delimiter - you will learn how to take
advantage of input filtering bugs. After this lesson you will be
able to create an admin account - of course without having the
administrator privileges
* Module 11. PHP injection - you will be demonstrated a PHP
code injection practical attack. Very important lesson. You will
see how a malicious data can be injected into a website, e.g
using a crafted image or text string
* Module 12. Direct static code injection - you
will learn what a ststic code injection is and how
it could be used by an attacker
* Module 13. SQL injection - one of the TOP3
techniques used by attackers nowadays. Step by
step practical demonstration. You can hack the
training website yourself (without harming
anybody)
* Module 14. XSS - Cross Site Scripting attack - you will see
for yourself why XSS is considered the most popular hackers'
target. By the end on this lesson you will intercept a user
session
* Module 14B. XST - Cross Site Tracing attack
* Module 15. XSRF - Cross Site Request Forgery attack - you will
learn how an attacker can force an unaware user to reset a
password
* Module 16. Spying on data with a browser - no
additional comment needed
* Module 17. Session hijacking - lesson on session
hijacking and consequences
* Module 18. Session fixation
* Module 19. Phishing - one of the most popular
attacks. You will learn some tips to protect
against it
* Module 20. Automated security testing - you will be taught
using automated security testing tools and learn what white
black and grey box testing is. Useful knowledge for web
developers and IT security consultants

IN EACH MODULE YOU WILL ALSO SEE HOW YOU CAN PROTECT YOUR
WEBSITE OR WEB APPLICATION AGAINST EVERY VULNERABILITY DESCRIBED
IN THE COURSE. MODULES ARE DIVIDED INTO: 1)
THEORETICAL INTRODUCTION, 2) PRACTICAL ATTACK
EXAMPLE, 3) SECURITY GUIDANCE

WHAT YOU NEED TO KNOW BEFORE YOU BEGIN:

* This ethical hacking course is intended to help you
regardless of your current knowledge and skills. All you need
is a basic computer knowledge and a Windows system
* We will show you how to prepare your training environment. In
this environment you can experiment freely, without doing harm to
anybody
* All the modules were recorded in Windows 7 (from the attacker /
victim point of view) but it doesn't mean that the presented
techniques apply only to Windows. Most of them are OS
independent
* You will download the ZIP package with all the
source codes and examples from our server before
you begin to avoid unnecessary code retyping
* Every module (lesson) contains the attack related
part, as well as a guidance to protect your own
website, web application or web server

What you will find inside can also be used by beginners - thanks
to live Video Training attached to the course. Almost every
module covered inside has been presented by a professional web
developer

Please be advised that all the techniques presented in "Website
Hacking in Practice" course can only be used
ethically and in your own testing / researching
environment. Note that you will get all the
required tools and information to prepare your own
training system. Please see the Legal information
in the 1st section for further legal reference

We guarantee your 100% satisfaction or you will get your money
back. You have 30 days to decide if the "Website Hacking in
Practice" training is for you. You will get access to the
whole system. If for any reason you're not satisfied with your
training, we will give you full refund. No questions asked

We wish you the best
The Hacking School Team

02_-_Download_your_training_code_and_examples/03_-_Your_ZIP_package_with_source_codes_and_examples.txt79 B
03_-_Environment_setup_and_training_system_configuration/05_-_Module_01._Introduction_and_environment_configuration_-_Video_Training.mp471.14 MiB
04_-_Basic_techniques/09_-_Module_03._Brute-force_and_dictionary_attacks_-_Video_Training.mp443.27 MiB
04_-_Basic_techniques/11_-_Module_04._Account_lockout_attack_-_Video_Training.mp414.7 MiB
04_-_Basic_techniques/07_-_Module_02._Deep_data_hiding_-_Video_Training.mp46.31 MiB
05_-_Lets_get_deeper_-_data_leaks/15_-_Module_06._Path_and_information_disclosure_-_Video_Training.mp418.79 MiB
05_-_Lets_get_deeper_-_data_leaks/19_-_Module_08._Path_traversal_-_Video_Training.mp417.4 MiB
05_-_Lets_get_deeper_-_data_leaks/22_-_Module_10._Parameter_delimiter_-_Video_Training.mp412.39 MiB
05_-_Lets_get_deeper_-_data_leaks/17_-_Module_07._Forced_browsing_-_Video_Training.mp46.2 MiB
05_-_Lets_get_deeper_-_data_leaks/13_-_Module_05._Web_parameter_tampering_-_Video_Training.mp45.21 MiB
06_-_Incjection_attacks/28_-_Module_13._SQL_injection_-_Video_Training.mp437.7 MiB
06_-_Incjection_attacks/26_-_Module_12._Direct_static_code_injection_-_Video_Training.mp419.62 MiB
06_-_Incjection_attacks/24_-_Module_11._PHP_injection_-_Video_Training.mp418.14 MiB
07_-_XSS_related_attacks/30_-_Module_14._XSS_-_Cross_Site_Scripting_attack_-_Video_Training.mp418.2 MiB
07_-_XSS_related_attacks/34_-_Module_15._XSRF_-_Cross_Site_Request_Forgery_attack_-_Video_Training.mp412.65 MiB
07_-_XSS_related_attacks/32_-_Module_14B._XST_-_Cross_Site_Tracing_attack_-_Video_Training.mp411.16 MiB
08_-_More_advanced_techniques/36_-_Module_16._Spying_on_data_with_a_browser_-_Video_Training.mp416.14 MiB
08_-_More_advanced_techniques/38_-_Module_17._Session_hijacking_-_Video_Training.mp49.86 MiB
08_-_More_advanced_techniques/40_-_Module_18._Session_fixation_-_Video_Training.mp48.1 MiB
09_-_Phishing/42_-_Module_19._Phishing_-_Video_Training.mp411.65 MiB
10_-_Security_testing_in_practice/44_-_Module_20._Automated_security_testing_-_Video_Training.mp425.31 MiB

Comments