Web Penetration Testing


Web Penetration Testing Training

 

  • Linux Basics
  • Windows Basics
  • Basic Web Development Knowledge
  • Web server Configuration
  • Web Server Lab Setup for Penetration Testing
  • Burpsuite Basics
  • Engagement Tools  in Burp suite
  • Payload Processing Rule in Burp suite
  • Burpsuite Encoder & Decoder
  • WordPress Penetration Testing using WPScan
  • WordPress Penetration testing using  Metasploit
  • WordPress Penetration Testing Lab Setup in Linux or Windows
  • Configure Web Application Penetration Testing Lab
  • Web Pentest Lab Setup using bWAPP in Windows 10
  • Web Penetration Lab Setup using Webgoat in kali Linux
  • DVWA and OWASP Mutillidae II Lab Setup in Windows
  • Web Penetration Testing Lab setup using XVWA
  • Web Hacking Lab Setup using DVNA in Kali Linux
  • Web Pentest Lab setup for Beginners using DVWS
  • Understanding the HTTP Protocol
  • Ways to Exploiting PUT Method
  • Ways to Detect HTTP Options
  • Netcat  tools usage
  • Web Application Penetration Testing with curl
  • Understand Cookies and Session Management
  • Understanding Encoding
  • Understanding HTTP Authentication Basic and Digest using Apache
  • Brute Force Website Login Page using Burpsuite
  • Hack the Basic HTTP Authentication using Burpsuite or Hydra
  • Spider Web Applications using Burpsuite
  • Banner Grabbing
  • Create Dictionary for Bruteforcing
  • Shodan a Search Engine for Hackers
  • Ways to Directory Bruteforcing on Web Server
  • Google Dorks
  • OS Command Injection
  • Command Injection Exploitation in DVWA using Metasploit (Bypass All Security)
  • ways to File upload vulnerability Exploitation
  • File Upload Exploitation in bWAPP (Bypass All Security)
  • Hack File upload Vulnerability in DVWA (Bypass All Security)
  • Webshell to Meterpreter
  • Web Shells Penetration Testing
  • File Inclusion Attack (LFI/RFI)
  • ways to Exploit LFi Vulnerability
  • Apache Log Poisoning through LFI
  • Web Server Exploitation with LFI and File Upload
  • RCE with LFI and SSH Log Poisoning
  • Understanding Redirection with Hashing and Crypto Salt
  • Understanding Redirection with Encoding Techniques
  • How to set up SQLI Lab in in Kali
  • SQL Injection
  • SQL Injection Boolean Based
  • How to Bypass SQL Injection Filter Manually
  • Form Based SQL Injection Manually
  • Dumping Database using Outfile
  • Manual SQL Injection Exploitation Step by Step
  • Cross Site Scripting (XSS)
  • Understanding DOM Based XSS in DVWA (Bypass All Security)
  • XSS Exploitation in DVWA (Bypass All Security)
  • Stored XSS Exploitation in DVWA
  • Understanding the CSRF Vulnerability
  • CSRF Attack in Beginners in DVWA
  • CSRF Exploitation using XSS
  • Insecure Direct Object References (IDOR)
  • Sqlmap (Target Options)
  • File System Access on Webserver using Sqlmap
  • Exploiting Form Based Sql Injection using Sqlmap
  • Exploiting Sql Injection with Nmap and Sqlmap
  • Easy way to Hack Database using Wizard switch in Sqlmap
  • SQL Injection Exploitation in Multiple Targets using Sqlmap
  • Sql Injection Exploitation with Sqlmap and Burp Suite (Burp CO2 Plugin)
  • Exploiting the Webserver using Sqlmap and Metasploit (OS-Pwn)
  • Command Injection Exploitation through Sqlmap in DVWA
  • Shell uploading on Web Server using Sqlmap
  • Database Penetration Testing using Sqlmap
  • Command Injection to Meterpreter using Commix
  • Exploit Command Injection Vulnearbility with Commix and Netcat
  • Powershell Injection Attacks using Commix and Magic Unicorn
  • bWAPP Command Injection Exploitation using Commix (Bypass All Security)
  • WordPress Penetration Testing using Symposium Plugin SQL Injection
  • ways to Brute Force Attack on WordPress Website
  • Penetration Testing in WordPress Website using WordPress Exploit Framework
  • Exploiting WordPress using Ninja Forms Unauthenticated File Upload
  • Exploit WordPress Using SlideShow Gallery Authenticated File Upload
  • Exploit WordPress using Plugin Foxypress uploadify.php Arbitrary Code Execution
  • Exploit WordPress Using WP EasyCart Unrestricted File Upload
  • Exploit WordPress Using InfusionSoft Upload Vulnerability
  • Exploit WordPress using WPTouch Authenticated File Upload
  • Exploit WordPress using Photo Gallery Unrestricted File Upload
  • Exploit WordPress using Work the Flow Upload Vulnerability
  • Exploit WordPress Using Ajax Load More PHP Upload Vulnerability
  • Exploit WordPress Using Reflex Gallery Upload Vulnerability
  • Exploit WordPress Using N-Media Website Contact Form with File Upload Vulnerability
  • Vulnerability Scanning in WordPress Site using WPScan
  • Exploit Joomla using autJoomla HTTP Header Unhenticated Remote Code Execution
  • How to Find Vulnerability in joomla Website using Backtrack
  • Exploiting Joomla using Account Creation and Privilege Escalation
  • Exploit Drupal using RESTWS Module Remote PHP Code Execution
  • Exploit Drupal using HTTP Parameter Key/Value SQL Injection
  • Vulnerability Analysis in Web Application using Burp Scanner
  • Fuzzing SQL,XSS and Command Injection using Burp Suite
  • Introduction to  HTML Injection
Advertisements