Description
Discovery, Exploitation & Mitigation – On this part you’ll discover ways to uncover, exploit and mitigate a lot of vulnerabilities, this part is split into a lot of sub-sections, every overlaying a particular vulnerability, firstly you’ll study what’s that vulnerability and what does it permit us to do, then you’ll discover ways to exploit this vulnerability and bypass safety, and eventually we’ll analyse the code inflicting this vulnerability and see tips on how to repair it, the next vulnerabilities are lined within the course:
- File add – This vulnerability permit attackers to add executable information on the goal net server, exploiting these vulnerabilities correctly offers you full management over the goal web site.
- Code Execution – This vulnerability permit customers to execute system code on the goal net server, this can be utilized to execute malicious code and get a reverse shell entry which supplies the attacker full management over the goal net server.
- Native File Inclusion – This vulnerability can be utilized to learn any file on the goal server, so it may be exploited to learn delicate information, we won’t cease at that although, you’ll study two strategies to exploit this vulnerability to get a reverse shell connection which supplies you full management over the goal net server.
- Distant File Inclusion – This vulnerability can be utilized to load distant information, exploiting this vulnerability correctly offers you full management over the goal net server.
- SQL Injection – This is among the most harmful vulnerabilities, it’s in all places and could be exploited to do all the issues the above vulnerabilities permit us to do and extra, so it permits you to login as admin with out understanding the password, entry the database and get all knowledge saved there corresponding to usernames, passwords, bank cards ….and so forth, learn/write information and even get a reverse shell entry which supplies you full management over the goal server!
- Cross Web site Scripting (XSS) – This vulnerability can be utilized to inject javascript code in susceptible pages, we received’t cease at that, you’ll discover ways to steal credentials from customers (corresponding to fb or youtube passwords) and even achieve full entry to their laptop.
- Insecure Session Administration- On this part you’ll discover ways to exploit insecure session administration in net purposes and login to different person accounts with out understanding their password, you’ll additionally discover ways to uncover and exploit CSRF (Cross Web site Request Forgery) vulnerabilities to power customers to alter their password, or submit any request you need.
Who this course is for:
Necessities
- No Linux, programming or hacking data required.
- Laptop with a minimal of 4GB ram/reminiscence.
- Working System: Home windows / OS X / Linux.

