gm@ictd-lb.com
00961 70 414 418
Register Now
Learn Website Hacking / Penetration Testing From Scratch

Learn how to hack websites and web applications like black hat hackers, and learn how to secure them from these hackers.
What Will I Learn?

    Set up a lab environment to practice hacking

    Install Kali Linux – a penetration testing operating system

    Install windows & vulnerable operating systems as virtual machines for testing
    Learn linux commands and how to interact with the terminal
    Learn linux basics
    Understand how websites & web applications work
    Understand how browsers communicate with websites
    Gather sensitive information about websites
    Discover servers, technologies and services used on target website
    Discover emails and sensitive data associated with a specific website
    Find all subdomains associated with a website
    Discover unpublished directories and files associated with a target website
    Find all websites hosted on the same server as the target website
    Discover, exploit and fix file upload vulnerabilities
    Exploit advanced file upload vulnerabilities & gain full control over the target website
    Intercepting requests using a proxy
    Discover, exploit and fix code execution vulnerabilities
    Exploit advanced code execution vulnerabilities & gain full control over the target website
    Discover, exploit & fix local file inclusion vulnerabilities
    Exploit advanced local file inclusion vulnerabilities & gain full control over the target website
    Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website
    Discover, fix, and exploit SQL injection vulnerabilities
    Bypass login forms and login as admin using SQL injections
    Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections
    Bypass filtering, and login as admin without password using SQL injections
    Adopt SQL queries to discover and exploit SQL injections in more secure pages
    Bypass filtering and security measurements
    Discover & exploit blind SQL injections
    Read / Write files to the server using SQL injections
    Gain full control over the target server using SQL injections
    Patch SQL injections quickly
    Learn the right way to write SQL queries to prevent SQL injections
    Discover basic & advanced reflected XSS vulnerabilities
    Discover basic & advanced stored XSS vulnerabilities
    Discover DOM-based XSS vulnerabilities
    How to use BeEF framwork
    Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities
    Steal credentials from hooked victims
    Run javascript code on hooked victims
    Create an undetectable backdoor
    Hack into hooked computers and gain full control over them
    Fix XSS vulnerabilities & protect yourself from them as a user
    What do we mean by brute force & wordlist attacks
    Create a wordlist or a dictionary
    Launch a wordlist attack and guess admin’s password
    Discover all of the above vulnerabilities automatically using a web proxy
    Run system commands on the target webserver
    Access the file system (navigate between directories, read/write files)
    Download, upload files
    Bypass security measurements
    Access all websites on the same webserver
    Connect to the database and execute SQL queries or download the whole database to the local machine

Requirements

    Basic IT Skills