O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Complete Ethical Hacking and Penetration Testing for Web Apps

Video Description

Learn OWASP TOP 10 Vulnerability Categories and the Defenses and Fixes for them. Covering all the popular hacking types

About This Video

  • You will learn to build a good security application or guide the developer to build a good application which is almost secure.
  • You will learn to test a web application or test a cloud-based application.

In Detail

In this course, we will be concentrating mainly on how Penetration Testing can be done on web-based applications. And it can also be used for mobile-based applications because most of the mobile-based applications communicate with a cloud-based API. The security of this API is actually the security of the mobile application which is using this API.

By the end of this course, you will have complete knowledge about Ethical hacking and penetration testing and you are going to have a really thrilling experience doing it. So, see you soon in the classroom.

Table of Contents

  1. Chapter 1 : Quick Overview of the Course
    1. Quick Overview of the Course 00:06:28
  2. Chapter 2 : Lab Setup 1: Install WAMP
    1. Install WAMP, the Apache, PHP and MySQL stack for hosting the demo web server 00:04:07
  3. Chapter 3 : Lab Setup 2: Install Mutillidae
    1. Install Mutillidae II, a free, open source, deliberately vulnerable web-app 00:03:49
  4. Chapter 4 : Lab Setup 3: Install Burp Suite
    1. Introduction - Implement CICD Pipelines With Jenkins DSL 00:07:38
  5. Chapter 5 : SQL Injection - Attack and Defenses
    1. Install Burp Suite - An integrated platform for security testing of web Sites 00:09:43
  6. Chapter 6 : OS Command Injection - Attack and Defenses
    1. OS Command Injection - Hacking Techniques and Defenses 00:07:25
  7. Chapter 7 : JSON Injection Attack using Reflected XSS Technique and Defense Measures
    1. JSON Injection Attack using Reflected XSS Technique and Defense Measures 00:11:40
  8. Chapter 8 : Cookie Manipulation Attack and Defenses
    1. Cookie Manipulation Attack and Defense Tips 00:11:08
  9. Chapter 9 : Username Enumeration Attack - Part 1& 2
    1. Username Enumeration Attack - Part 1 00:07:06
    2. Username Enumeration Attack and Defense Tips - Part 2 00:07:06
  10. Chapter 10 : Brute Force Attack Technique and Defenses
    1. Brute Force Attack Technique and Defenses 00:11:49
  11. Chapter 11 : Cross Site Scripting (Reflected XXS using HTML Context)
    1. Cross Site Scripting (Reflected XXS using HTML Context) 00:08:15
  12. Chapter 12 : Cross Site Scripting (Reflected XXS using JavaScript)
    1. Cross Site Scripting (Reflected XSS using JavaScript) 00:10:40
  13. Chapter 13 : Storage Cross Site Scripting Attack - XSS Defenses
    1. Storage Cross Site Scripting Attack - XSS Defenses 00:11:02
  14. Chapter 14 : Insecure Direct Object Reference - IDOR and Defense using File Tokens
    1. Insecure Direct Object Reference - IDOR and Defense using File Tokens 00:08:06
  15. Chapter 15 : Insecure Direct Object Reference - IDOR and Defense using URL Tokens
    1. Insecure Direct Object Reference - IDOR and Defense using URL Tokens 00:05:04
  16. Chapter 16 : Directory Browsing / Traversal Threat Demonstration
    1. Directory Browsing / Traversal Threat Demonstration 00:05:32
  17. Chapter 17 : XXE - XML External Entity Attack
    1. XXE - XML External Entity Attack Demonstration 00:05:55
  18. Chapter 18 : User Agent Manipulation or Spoofing Attack
    1. User Agent Manipulation or Spoofing Attack 00:08:02
  19. Chapter 19 : Security miss-configuration Attack Defenses (DIR Browsing, XXE, User Agent)
    1. Security miss-configuration Attack Defenses (DIR Browsing, XXE, User Agent) 00:04:34
  20. Chapter 20 : Sensitive Data Exposure Vulnerability (HTML/CSS/JS Comments)
    1. Sensitive Data Exposure Vulnerability (via HTML/CSS/JS Comments) 00:04:29
  21. Chapter 21 : Hidden / Secret URL Vulnerability and Defenses
    1. Hidden / Secret URL Vulnerability and Defenses 00:10:18
  22. Chapter 22 : HTML 5 Web Storage Vulnerability and Defenses
    1. HTML 5 Web Storage Vulnerability and Defenses 00:08:44
  23. Chapter 23 : Role Based Access Vulnerability and Defense
    1. Role Based Access Vulnerability and Defense 00:05:08
  24. Chapter 24 : CSRF - Cross Site Request Forgery Attack
    1. CSRF - Cross Site Request Forgery Attack - Part 1 00:08:37
    2. CSRF - Cross Site Request Forgery Attack & Defenses - Part 2 00:04:21
  25. Chapter 25 : Entropy Analysis for CSRF Token
    1. Entropy Analysis for CSRF Token 00:11:34
  26. Chapter 26 : CVSS - Common Vulnerability Scoring System
    1. CVSS - Common Vulnerability Scoring System 00:05:57
  27. Chapter 27 : Unvalidated URL Redirect Attack and Prevention code sample
    1. Unvalidated URL Redirect Attack and Prevention code sample 00:07:07