Learn 100% Hands-On Real World Practical Approach!! Hack Websites Like PRO and protect your Company from Cyber Attacks
What you’ll learn
-
What is Virtualization
-
What is Virtual Machine
-
Kali Linux 2020
-
Master Linux Commands
-
Troubleshoot Kali Linux
-
System Commands
-
Network Commands
-
User Commands
-
Add and Delete User with full Sudo Permission
-
What is DVWA
-
What is XAMPP
-
Command Injection Attack
-
File Inclusion Attack
-
File Upload Attack
-
XSS Attack
-
DOM Based XSS Attack
-
Reflected XSS Attack
-
Stored XSS Attack
-
What is OWASP Mutillidae II
-
Root Access
-
SQL Injection
-
SQL MAP
-
How to solve Security Challenges
-
Scan WebServer using NIKTO
-
Burp Suite
-
BEEF Framework
-
OWASP Juice Shop
Requirements
-
4 GB (Gigabytes) of RAM or higher (8 GB recommended)
-
Minimum 20 GB or more disk space
-
No Linux, programming or hacking knowledge required
-
Operating System: Windows / OS X / Linux
-
Enable virtualization technology on BIOS settings, such as “Intel-VTx”
-
All items referenced in this course are Free
-
A strong desire to understand hacker tools and techniques
-
A strong desire to understand hacker tools and techniques
-
Must follow our Social Media page in Instagram and YouTube Channel
Description
Hello everyone..!!
welcome to the CWAPT i.e. the Complete Web application Penetration Testing Practical Course . My name is DEBAYAN DEY and i will be your Instructor for the CWAPT Course.
Now this course is designed for anyone who is interested in learning how an attacker attack and get the information from website by exploiting various vulnerabilities available.
CWAPT is designed by keeping in mind that most of us are having laptops or computer machine to work for most of the time and in a survey , we came up with the answer that most of the Computer users are very much interested in Learning how Web Application Penetration Testing works and what are the process in which we use penetration testing and security skills to find different vulnerabilities in web applications. As we all know , website and webservers plays an important role in every modern organization, Thats why in this course curriculum , Only you need a computer device and this entire course is 100% practical based ! isn’t this amazing ??? and everything will be explained in depth , followed with reading materials and quizes which will give you a boost in the field of Ethical Hacking!!! so all in one , you just require a computer device and turn it into powerful ethical hacking machine.
Little brief about my name , i am Certified Secure Computer User (CSCU) v2 , and Certified Ethical Hacker (CEH V10) from EC COUNCIL
also i am certified Google IT support from Google , and currently doing micromaster in the Field of Cyber Security from Rochester institute of technology (RIT) New York in edx .
here are few of my other accomplishments in the field of cyber security ,
- Introduction to Cyber Attacks , New York University
- introduction to Cyber security for business , University of Colorado System
- Palo Alto Networks academy cybersecurity foundation , Palo alto networks
- International cyber conflicts , The State University of New York
- Cyber Attacks Countermeasures , New York University
- Networking ans security Architecture with Vmware NSX
- Enterprise System Management and security ,University of Colorado System
- Meet and Greet !!!
- Downloading and installation of virtual box
- Understanding of what is Virtual Machine
- Download of Kali Linux Virtual Box image
- Installation of Kali linux 2020
- Booting up kali in virtual box for the 1st time
- Default login and update and upgrade
- Full Screen and understanding FSH i.e. File System Hierarchy
- and much more with Reading Materials and Quizzes ..!!
- Basic linux command who am i
- Basic Commands su and pwd
- Basic command ls touch nano
- Basic command cat cp mkdir
- Basic Command mv and rm
- System and User Commands
- Network commands
- Add New User with full sudo Permission
- How to delete user using command line
- and much more with Reading Materials and Quizzes ..!!
- What is DVWA
- XAMPP Theory and Installation
- DVWA download Install and configuration with XAMPP
- Command Injection Low , Medium and High Security
- File Inclusion Low , Medium and High Security
- File Upload Low , Medium and High Security
- XSS DOM Low , Medium and High Security
- XSS Reflected Low , Medium and High Security
- XSS Stored Low , Medium and High Security
- and much more with Reading Materials and Quizzes ..!!
- Download and install Mutillidae II
- Root access denied fixed
- SQL Injection
- SQL Injection Reexplained
- SQL injection with SQL MAP
- How to solve show hints in security level 5 challenge
- How to scan a webserver using NIKTO
- XSS in Mutilidae Theory and Practical
- DOM based XSS Explanation
- Reflected XSS
- Stored XSS
- BEEF Framework
- and much more with Reading Materials and Quizzes ..!!
- What is OWASP Juice shop and installation of nodejs and npm
- OWASP juice shop up in running
- Finding the Score Board Level 1 Difficulty Challenge
- Zero Star Feedback Level 1 Difficulty Challenge
- Access Confidential Document Level 1 Difficulty Challenge
- DOM based XSS Level 1 Difficulty Challenge
- Error Handling Level 1 Difficulty Challenge
- Missing Encoding Level 1 Difficulty Challenge
- Bonus Payload DOM XSS Level 1 Difficulty Challenge
- Exposed Metrics Level 1 Challenge
- Outdated WhiteList Level 1 Challenge
- Privacy Policy Level 1 Difficulty Challenge
- Repetitive Registration Level 1 Difficulty Challenge
- and much more to cover …!!!
- Most importantly , this course is completely for educational purpose
- all the attacks which an attacker perform are demonstrated to you so that you understand the technology and the art behind it and you’re not fooled by any kind of social engineering.
- This course is for educational and awareness purpose , to make everyone aware and be safe and protect your data.
- Its a request , please do not perform any illegal activities , Udemy and me ( Debayan Dey ) is not responsible for your illegal activities you perform.
Who this course is for:
- Anybody interested in learning website & web application hacking / penetration testing
- Anyone who is curious about how data is leaked from social media environments
- Anybody interested website hacking
- Anyone who is afraid of being hacked and would like to secure his/her websites
- Anyone who is afraid of being hacked and would like to secure his/her websites
- Anybody interested in learning how to secure websites & web applications from hacker
- Web admins so they can secure their websites
- Web developers so they can create secure web application & secure their existing ones