Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Web Application Penetration Testing From %00
1 Course Introduction
1.1 Course Introduction (4:42)
1.2 Setting Up The Environment, Burp Suite Configuration (10:49)
2 Information Gathering, Error Handling & Configuration Testing
2.1 Reconnaissance, Information Leakage, Enumeration (9:44)
2.2 Fingerprinting And Mapping The Application Architecture (9:38)
2.3 Test The Network/Infrastructure Configuration (12:59)
2.4 Stack Traces And Error Codes Information Leakage (5:59)
3 Authentication & Authorization Testing
3.1 Identity Management Testing (7:48)
3.2 Authentication Testing (15:36)
3.3 Authorization Testing (11:38)
4 Session Management Testing
4.1 Bypassing The Session Management Schema, Tampering With Cookie Attributes (5:51)
4.2 Testing For Session Fixation And Cross Site Request Forgery (CSRF) (9:54)
5 Input Validation Testing: XSS, SQLi, Command Injection
5.1 Cross-Site Scripting (7:41)
5.2 SQL, ORM, XPath, IMAP/SMTP Injection (13:46)
5.3 LDAP, XML, SOAP Injection (11:11)
5.4 Code And Command Injection (6:50)
5.5 Testing For HTTP Verb Tampering, Parameter Pollution, Splitting/Smuggling (10:02)
5.6 Testing For Buffer Overflows (20:49)
6 Weak Cryptography & Business Logic Testing
6.1 Weak SSL/TLS Ciphers, Weak Encryption (3:20)
6.2 Testing For Padding Oracle (4:14)
6.3 Testing Business Logic Data Validation, Testing Against Application Misuse (9:24)
6.4 Testing The Upload Of Malicious Files (13:19)
7 Client Side Testing
7.1 DOM Based XSS, HTML Injection, Clickjacking (9:19)
8 Course End
8.1 Where To Go From Here (3:52)
Teach online with
2.4 Stack Traces And Error Codes Information Leakage
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock