Although website hacking is covered in one of my other courses, that course only covers the basics where this course dives much deeper in this topic covering more techniques, more vulnerabilities, advanced exploitation, advanced post exploitation, bypassing security and more.
This course focuses on website hacking, I have a different course that teaches bug hunting from scratch.
Although website hacking is covered in one of my other courses, that course only covers the basics where this course dives much deeper in this topic covering more techniques, more vulnerabilities, advanced exploitation, advanced post exploitation, bypassing security and more.
This course focuses on website hacking, I have a different course that teaches bug hunting from scratch.
Welcome to my comprehensive course on Website hacking / penetration testing. This course assumes you have NO prior knowledge in hacking, it starts with you from scratch and takes you step-by-step to an advanced level, being able to hack websites like black-hat hackers and secure them like security experts.
This course is highly practical but doesn't neglect the theory, we'll start with basics to teach you how websites work and install the needed software (on Windows, Linux and Apple Mac OS). Then we'll start hacking straight away. You'll learn everything by example, by discovering vulnerabilities and exploiting them to hack websites. No boring dry lectures
Before jumping into hacking, you'll first learn how to gather comprehensive information about the target website. Then the course is divided into a number of sections, each aims to teach you a common vulnerability from the OWASP top 10 most common security threats. Each section takes you through a number of hands-on examples to teach you the cause of the security bug or vulnerability and how to discover it and exploit it in a number of scenarios, from simple to advanced, ultimately allowing you to hack the target website. You'll also learn advanced techniques to bypass filters and security, escalate your privileges, access the database and much more post-exploitation techniques. As we do this I will also introduce you to different hacking and security concepts, tools and techniques. Everything will be taught through examples and hands-on practicals, there will be no useless or boring lectures.
Here's a more detailed breakdown of the course content:
1. Information Gathering - In this section you'll learn how to gather comprehensive information about a target website, you'll learn how to discover its DNS information, the services used, subdomains, un-published directories, sensitive files, user emails, websites on the same server and even the hosting provider. This information is crucial as it expands the attack surface, increasing our changes of successfully hacking the target website.
2. Discovery, Exploitation & Mitigation - In this section you will learn how to discover, exploit and mitigate a common vulnerabilities from the OWASP top 10 most common security threats. This section is divided into a number of subsections. Each subsection takes you through a number of hands-on examples to teach you the cause of the vulnerability, how to discover it and how to exploit it in a number of scenarios, from simple to advanced, ultimately allowing you to hack the target website. You'll also learn advanced techniques to bypass filters and security. Finally we will analyse the code causing these vulnerabilities and d,
Here's a list of the main vulnerabilities that will be covered in this section.
Information Disclosure.
File upload.
Code Execution.
Local File Inclusion.
Remote File Inclusion.
SQL Injection.
Cross Site Scripting (XSS).
Insecure Session Management.
Brute Force & Dictionary Attacks.
CSRF (Client-Side Request Forgery).
3. Post Exploitation - In this section you will learn what can you do with the access you gained by exploiting the above vulnerabilities. You will learn how to convert reverse shell access to a Weevely access and vice versa, how to execute system commands on the target server, navigate between directories, access other websites on the same server, upload/download files, access the database and even download the whole database to your local machine. You will also learn how to bypass security, privilege escalation and do all of the above with limited permissions on the server .
You'll use the following tools to achieve the above:
Kali Linux.
Weevely.
THC-Hydra .
Netcat .
Dev tools.
Burp Suite.
OWASP Zap.
Metasploit.
BeEF.
Dirb.
Maltego.
Knockpy.
With this course you get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.
Checkout the curriculum and the course teaser for more info.
Notes:
This course is created for educational purposes only and all the attacks are launched in my own lab or against systems that I have permission to test.
This course is totally a product of Zaid Sabih & zSecurity, no other organization is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that
Hello & welcome to this course, this lecture will give you an overview of the structure of the course, and what you'll learn in it.
In this course, we will be using a number of operating systems, Kali for hacking and 2 others as target machines, in this section you will learn how to install all of these machines as virtual machines inside your current operating system, this allows us to use all of the machines at the same time, it also completely isolates these machines from your main machine therefore your main machine will not be affected if anything goes wrong.
Everything shown here will work on Windows, Linux and OS X.
This lecture will introduce you to the hacking operating system that we will be using throughout the course; Kali Linux. You will learn what it is, how to download it, and how to enable virtualisation on your system to run it as a virtual machine.
This lecture will teach you how to install Kali Linux as a virtual machine in VMware Workstation Player on Windows.
VMware is the software that we will use to install different operating systems inside our current operating system as virtual machines. This will be very useful as you can use it to test and practice what you learn in this course.
This lecture will teach you how to install Kali Linux as a virtual machine in VMware Fusion on Mac OS.
VMware is the software that we will use to install different operating systems inside our current operating system as virtual machines. This will be very useful as you can use it to test and practice what you learn in this course.
This lecture will teach you how to install Kali Linux as a virtual machine in VMware Workstation Player on Linux.
VMware is the software that we will use to install different operating systems inside our current operating system as virtual machines. This will be very useful as you can use it to test and practice what you learn in this course.
In this lecture you will learn how to install a vulnerable operating system (Metasploitable) as a virtual machine so we can use it to practice penetration testing in future lectures.
In this lecture we will have a basic look on Kali linux just to get you comfortable with using it.
You will learn how to use its main applications, browse files, connect to the internet ....etc.
In this lecture you will learn how to interact with the linux terminal and run linux commands.
In this lecture you will learn how to configure the network settings for the lab machines and how to access the websites that we will try to hack from the Kali machine.
Before diving into website hacking you need to now some basics about websites, this lecture will explain to you what is a website, what it contains, technologies used in it and how all of these components interact with each other.
In this lecture you will learn the various methods and approaches that can be used to hack into a website.
In this lecture you will learn how to gather information about the website/ domain name owner, server IP address, hosting company and more.
In this lecture we will use Netcraft to discover the technologies used on the target website, such as the web server used, installed web applications and more!
This lecture will teach you how to gather detailed DNS information about the target website such as it DNS records, resources it shares with other websites and more!
This lecture will show you how to discover websites on the same server as your target website, this is very useful as these websites can be used to gain access to your target website.
In this lecture we will use a tool called knock to discover subdomains on the target website, this is useful as these subdomains could contain beta web applications, private web applications or login pages.
In this lecture you will learn how to use a tool called dirb to discover files on the target website, this can be helpful as it might reveal files that contain sensitive data.
In this lecture we will analyse the files we discovered in the previous lecture and see the information they contain.
Maltego is a great information gathering tool that can be used to gather information just about anything (people, websites, computers, servers ...etc).
In this lecture we will have an overview on the tool and some basic use, you will learn how to discover domains, websites, servers and emails associated with your target.
In this lecture we will dive deeper into Maltego, you will learn how to discover more info about the target such as admin's email, hosting company, servers and lay out this information nicely.
File upload vulnerabilities allow attackers to upload files on the web server.
This lecture will introduce you to these vulnerabilities and teach you how to discover and exploit them to gain full control over the target server.
In this lecture you will learn more about how websites work, how the browser communicate with web server, http request types, and how to use this method of communication to discover and exploit advanced vulnerabilities.
In this lecture you will learn how to use Burp Suit to intercept GET & POST requests and modify them.
This can be useful in so many cases, to discover vulnerabilities, bypass filters.....etc
Now that we know how to intercept HTTP requests, in this lecture you will learn how to exploit a more secure file upload vulnerability and gain full control over the target web server.
In this lecture we will have a look on an even more secure upload page, you'll learn how to use Burp Suite to intercept the upload request and exploit the upload functionality to gain full control over the target web server.
In this lecture we shall have a look on the code causing the above vulnerabilities, you will learn why the above vulnerabilities are exploitable and how to fix these pages to prevent file upload vulnerabilities.
Code execution vulnerabilities allow attackers to run system commands on the web server.
This lecture will introduce you to these vulnerabilities and teach you how to discover and exploit them to get a reverse shell and hack websites.
This lecture will teach you how to exploit more secure code execution vulnerabilities to get a reverse shell and gain full control over the target server.
In this lecture we shall have a look on the code causing the above vulnerabilities, you will learn why the above vulnerabilities are exploitable and how to fix these pages to prevent code execution vulnerabilities.
Local File Inclusion vulnerabilities or (LFI) allow hackers to read local files on the server that they are not supposed to read.
This lecture will introduce you to these vulnerabilities and teach you how to discover and exploit them to read any file on the target server.
In this lecture you will learn how to exploit local file inclusion to get reverse shell and gain full control over the target web server.
Here you will learn another method to use a local file inclusion vulnerability to get a reverse shell and gain full control over the target web server.
This lecture will teach you how to configure php setting to allow remote file inclusion, so we can practice a remote file inclusion vulnerability in the next lecture.
Remote File Inclusion vulnerabilities (RFI) allow hackers to include remote files.
This lecture will introduce you to these vulnerabilities and teach you how to discover and exploit them to get a reverse shell and gain full control over the target server.
This lecture will teach you how to exploit more secure remote file inclusion vulnerabilities to get a reverse shell and gain full control over the target server.
In this lecture we shall have a look on the code causing the above vulnerabilities (Both local and remote file inclusion), you will learn why the above vulnerabilities are exploitable, how to fix them and secure pages from them.
This lecture will explain what is SQL and what is it used for, this is important to understand before we dive into sql injection vulnerabilities.
This lecture highlights why SQL injections are considered one of the most dangerous vulnerabilities.
This video will teach you how to discover SQL injections in text boxes.
This lecture will teach you how to bypass login forms if the inputs are injectable, this will allow us to login as any user without a password.
In this lecture you will learn how to bypass security measurements in login forms, you will learn how to bypass client side filtering and login as admin without a password.
In this lecture we shall have a look on the code causing the above vulnerabilities, you will learn why the above vulnerabilities are exploitable, and how to quickly mitigate them .
In this lecture we will learn how to discover SQL injections in GET requests, ie: in URL parameters.
This video will teach you how to build a basic SELECT statement to exploit the SQL injection vulnerability we discovered in the previous lecture to find the database user, database name and version.
In this lecture we will use our SELECT statement to further exploit this SQL injection vulnerability and discover the tables on the current database.
Now we will use all the discovered information we got so far to further exploit this SQL injection vulnerability and find the usernames and passwords of all the users on the website.
Blind SQL injections are ones that do not show errors, this lecture will introduce you to these vulnerabilities and teach you how to discover and exploit them to hack websites and do all of the SQL injection techniques we learned so far.
In this lecture we will have a look on a more secure page, you will learn how to adopt your sql queries to discover and exploit more advanced SQL injections.
In this lecture you will learn how to bypass more security measurements and extract all usernames and passwords stored in the database.
In this lecture we will discuss some tricks on bypassing client-side and server-side filters to discover and exploit SQL injections on more secure websites.
In some cases the target web page might be vulnerable to an SQL injection, but it would only display one result at a time limiting our ability to exploit it, in this lecture you will learn how to bypass that by iterating over all the records.
This lecture will show you a quick method to mitigate SQL injection vulnerabilities.
This lecture will teach you how to use SQLi to read or write files to the server, this is very useful as it can be used to read sensitive files, or upload files with evil code that would allow us to gain full control over the target web server.
In this lecture you will learn how to exploit an SQL injection vulnerability to get a reverse shell access and gain full control over the target server.
In this video we will have a look on a tool called SQLmap and learn how to use it to do all of the attacks that we did before and much more!
In this lecture you will learn how to use SQLmap to get a system shell, or an SQL shell where you can directly interact with the datavase and run SQL queries.
In this lecture we shall have a look on the code causing the above vulnerabilities, you will learn why the above vulnerabilities are exploitable, and how to properly write web applications that are not vulnerable to SQL injections.
Cross Site Scripting or XSS vulnerabilities allow hackers to include javascript in the loaded pages.
This lecture will introduce you to these vulnerabilities.
This lecture will teach you what is reflected XSS vulnerabilities and how to discover them.
In this lecture we will have a look on a more advanced reflected XSS vulnerability, you will learn how to discover it and exploit it.
In this lecture you will learn more about discovering XSS vulnerability, you will be able to discover even more advanced XSS vulnerabilities.
This lecture will teach you what is stored XSS vulnerabilities and how to discover them.
This lecture will show you how to discover and exploit more advanced stored XSS vulnerabilities.
In this lecture you will learn how to set up a windows virtual machine so that we can try and hack into it to practice penetration testing.
BeEF is a browser exploitation framework that allows us to run a large number of commands on hooked browsers.
In this lecture you will learn how to use reflected XSS vulnerabilities to hook targets to BeEF, once they are hooked, you can run all the attacks BeEF allows you to (explained later in the course), such as injecting a keylogger or gaining full control over the target machine.
In this lecture you will learn how to use stored XSS vulnerabilities to hook targets to BeEF, once they are hooked, you can run all the attacks BeEF allows you to (explained later in the course), such as injecting a keylogger or gaining full control over the target machine.
BeEF is a browser exploitation framework that allows us to run a large number of commands on hooked browsers.
In this lecture we will have an overview of the interface, how to navigate it and use it execute commands on hooked browsers.
In this lecture you learn how to run basic commands on the target machine using BeEF, you'll learn how to run any Javascript code, get a screenshot of the page they're browsing and redirect them to any page you want.
In this video you will learn how to use beef to display a fake login dialog to the target user and steal the password they enter, dialogs can be made for Facebook, Youtube, Microsoft or you can even create your own using the custom option.
In this lecture you will learn how to download and install Veil Framework.
This lecture will give you an overview on Veil Framework and its basic commands.
You will also learn what is a payload and the different types of payloads that can be generated with Veil.
In this lecture you will learn how to create a backdoor that is not detectable by antivirus programs, this is very important in client side attacks as we will be using this backdoor in future videos to try and gain control over the target system.
In this lecture you will learn how to listen for connections coming from the backdoor we generated in the previous lecture.
Finally we will test the backdoor that we generated on a Windows machine and make sure that it works as expected.
In this video we will se BeEF to create a fake notification bar telling the user that there is a new update, the update is actually a backdoor, so once they install that update we will gain full control over the target machine.
In this lecture we shall have a look on the code causing the above vulnerabilities, you will learn why the above vulnerabilities are exploitable, how to fix these vulnerabilities and secure pages from file them.
You will also learn how to protect yourself as a user from XSS vulnerabilities.
In this lecture you will learn how to exploit insecure session management to login to any account on the target website without the account password.
Cross Site Request Forgery vulnerabilities or CSRF allow attackers to force users to send requests that they don't want, this can be very dangerous as it can be exploited to force users to change their password, submit forms.....etc
This lecture you will introduce you to these vulnerabilities and teach you how to discover them.
In this lecture you will learn how to exploit CSRF vulnerabilities, you will learn how to create a HTML file that will change the password of the person who opens it to any password you want.
In this lecture you will learn a more advanced method to exploit CSRF vulnerabilities, you will learn how to generate a URL that would change the password of anybody who clicks on it to any password you want..
In this lecture we will analyse the weaknesses that allow attackers to forge requests and teach you the right way to prevent CSRF vulnerabilities.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.