Introduction to Web Application Security Testing with Kali Linux

Introduction to Web Application Security Testing with Kali Linux

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 1h 40m | 810 MB

Most businesses today use web applications to interact with their customers. These web applications can provide hackers with the entry points they use to attack internal business systems, allowing the possibility of data theft or corruption. This video, designed for entry to intermediate-level security engineers, describes the vulnerabilities often found in web apps, shows you the techniques hackers typically use to exploit those vulnerabilities, and explains the processes and toolsets you can use to test for and remediate against those vulnerabilities. Participants should have access to Kali Linux before starting the course.

  • Understand how to identify web-based vulnerabilities and remediate against them
  • Explore hacker techniques like cross site scripting, SQL injection, and command injection
  • Learn how to identify web app misconfigurations and how to correct them
  • Survey web app vulnerability analysis tools like HackBar, XSS Rays, and PageXray
  • Discover techniques and toolsets (SSLScanner, Google Hacking, etc.) that test for vulnerabilities
Table of Contents

01 Welcome to the Course
02 About the Author
03 System Requirements
04 Basic Web Architecture
05 WebGoat
06 Cross-Site Scripting
07 SQL Injection
08 Command Injection
09 Cross-Site Request Forgery
10 XML Injection
11 Weak Encryption
12 Weak Authentication
13 Poor Error Handling
14 Using Proxies
15 TamperData
16 Firebug
17 Request Maker
18 Site Spider
19 HTTP Headers Live
20 HackBar
21 Bug Magnet
22 Cookie Editors
23 Grease Monkey
24 Switching User Agents
25 Wappalyzer
26 PageXray
27 ModHeader
28 Proxy Switching
29 SSLScanner
30 Interacting with Servers (nc, telnet, openssl)
31 Header Information
32 XSSed
33 Google Hacking
34 Google Hacking Database