только у нас скачать шаблон dle скачивать рекомендуем

Фото видео монтаж » Видео уроки » Видео уроки web-design » Burp Suite Apprentice Web App Penetration Testing Course

Burp Suite Apprentice Web App Penetration Testing Course

Burp Suite Apprentice Web App Penetration Testing Course

Burp Suite Apprentice Web App Penetration Testing Course
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.64 GB | Duration: 3h 18m


Master the basics of Web Application Penetration Testing

What you'll learn
basic web application vulnerabilities
getting started in web application penetration testing
getting started in web application bug bounty
preparing for the Burp Suite Certified Practitioner (BSCP) certification
52 ethical hacking & security videos
Burp apprentice labs solved and explained step by step
SQL injection
Cross-site scripting (XSS)
Cross-site request forgery (CSRF)
Clickjacking
Cross-origin resource sharing (CORS)
XML external entity (XXE) injection
Server-side request forgery (SSRF)
OS command injection
Directory traversal
Access control vulnerabilities
Authentication
WebSockets
Insecure deserialization
Information disclosure
Business logic vulnerabilities
HTTP Host header attacks
OAuth authentication
File upload vulnerabilities
JWT
Essential skills
Prototype pollution

Requirements
Basic IT Skills
Basic understanding of web technology
No Linux, programming or hacking knowledge required
Computer with a minimum of 4GB ram/memory
Operating System: Windows / Apple Mac OS / Linux
Reliable internet connection
Burp Suite Community (Pro optional)
Firefox Web Browser

Description
Welcome to the Burp Suite Apprentice – Web Application Penetration Testing & Bug Bounty Hunting training course.Your instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.This course features all current 52 Apprentice labs. Martin is solving them all and giving useful insight on how to find and exploit these vulnerabilities. He is not just inserting the payload but explains each step on finding the vulnerability and why it can be exploited in a certain way. The videos are easy to follow along and replicate. Martin is also dropping a lot of tips and tricks for those who wish to get the Burp Suite Certified Practitioner certification (BSCP). This training is highly recommended for anyone who wants to start out in Web Application Penetration Testing, Web Application Bug Bounty Hunting or as a pre-requisite for the Professional course towards the Burp Suite Certified Practitioner certification (BSCP) certification.It will feature all apprentice labs in the following sections:· SQL injection· Cross-site scripting· Cross-site request forgery (CSRF)· Clickjacking· Cross-origin resource sharing (CORS)· XML external entity (XXE) injection· Server-side request forgery (SSRF)· OS command injection· Directory traversal· Access control vulnerabilities· Authentication· WebSockets· Insecure deserialization· Information disclosure· Business logic vulnerabilities· HTTP Host header attacks· OAuth authentication· File upload vulnerabilities· JWTNotes & DisclaimerPortswigger labs are a public and a free service from Portswigger for anyone to use to sharpen their skills. All you need is to sign up for a free account. I will update this course with new labs as they are published. I will to respond to questions in a reasonable time frame. Learning Web Application Pen Testing / Bug Bounty Hunting is a lengthy process, so please don't feel frustrated if you don't find a bug right away. Try to use Google, read Hacker One reports and research each feature in-depth. This course is for educational purposes only. This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack.

Overview
Section 1: Introduction

Lecture 1 Introduction

Section 2: SQL injection

Lecture 2 SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

Lecture 3 SQL injection vulnerability allowing login bypass

Section 3: Cross-site scripting (XSS)

Lecture 4 Reflected XSS into HTML context with nothing encoded

Lecture 5 Stored XSS into HTML context with nothing encoded

Lecture 6 DOM XSS in document.write sink using source location.search

Lecture 7 DOM XSS in innerHTML sink using source location.search

Lecture 8 DOM XSS in jQuery anchor href attribute sink using location.search source

Lecture 9 DOM XSS in jQuery selector sink using a hashchange event

Lecture 10 Reflected XSS into attribute with angle brackets HTML-encoded

Lecture 11 Stored XSS into anchor href attribute with double quotes HTML-encoded

Lecture 12 Reflected XSS into a jаvascript string with angle brackets HTML encoded

Section 4: Cross-site request forgery (CSRF)

Lecture 13 CSRF vulnerability with no defenses

Section 5: Clickjacking

Lecture 14 Basic clickjacking with CSRF token protection

Lecture 15 Clickjacking with form input data prefilled from a URL parameter

Lecture 16 Clickjacking with a frame buster script

Section 6: Cross-origin resource sharing (CORS)

Lecture 17 CORS vulnerability with basic origin reflection

Lecture 18 CORS vulnerability with trusted null origin

Section 7: XML external entity (XXE) injection

Lecture 19 Exploiting XXE using external entities to retrieve files

Lecture 20 Exploiting XXE to perform SSRF attacks

Section 8: Server-side request forgery (SSRF)

Lecture 21 Basic SSRF against the local server

Lecture 22 Basic SSRF against another back-end system

Section 9: OS command injection

Lecture 23 OS command injection, simple case

Section 10: Directory traversal

Lecture 24 File path traversal, simple case

Section 11: Access control vulnerabilities

Lecture 25 Unprotected admin functionality

Lecture 26 Unprotected admin functionality with unpredictable URL

Lecture 27 User role controlled by request parameter

Lecture 28 User role can be modified in user profile

Lecture 29 User ID controlled by request parameter

Lecture 30 User ID controlled by request parameter, with unpredictable user IDs

Lecture 31 User ID controlled by request parameter with data leakage in redirect

Lecture 32 User ID controlled by request parameter with password disclosure

Lecture 33 Insecure direct object references

Section 12: Authentication

Lecture 34 Username enumeration via different responses

Lecture 35 2FA simple bypass

Lecture 36 Password reset broken logic

Section 13: WebSockets

Lecture 37 Manipulating WebSocket messages to exploit vulnerabilities

Section 14: Insecure deserialization

Lecture 38 Modifying serialized objects

Section 15: Information disclosure

Lecture 39 Information disclosure in error messages

Lecture 40 Information disclosure on debug page

Lecture 41 Source code disclosure via backup files

Lecture 42 Authentication bypass via information disclosure

Section 16: Business logic vulnerabilities

Lecture 43 Excessive trust in client-side controls

Lecture 44 High-level logic vulnerability

Lecture 45 Inconsistent security controls

Lecture 46 Flawed enforcement of business rules

Section 17: HTTP Host header attacks

Lecture 47 Basic password reset poisoning

Lecture 48 Host header authentication bypass

Section 18: OAuth authentication

Lecture 49 Authentication bypass via OAuth implicit flow

Section 19: File upload vulnerabilities

Lecture 50 Remote code execution via web shell upload

Lecture 51 Web shell upload via Content-Type restriction bypass

Section 20: JWT

Lecture 52 JWT authentication bypass via unverified signature

Lecture 53 JWT authentication bypass via flawed signature verification

Anybody interested in learning basic ethical web application hacking / penetration testing,Anybody interested in learning basic ethical web application bug bounty hunting,Anybody interested in learning how hackers hack web applications,Developers looking to expand on their knowledge of vulnerabilities that may impact them,Anyone interested in application security,Anyone interested in Red teaming,Anyone interested in offensive security


HOMEPAGE


  https://www.udemy.com/course/burp-suite-apprentice-web-app-penetration-testing-course/ 


DOWNLOAD


https://rapidgator.net/file/c47d65dd7068078f0a5fe2c813a455d6/Burp_Suite_Apprentice_Web_App_Penetration_Testing_Course.part1.rar.html
https://rapidgator.net/file/240ff48f04ad7fa4f2d143cf2f48ef5a/Burp_Suite_Apprentice_Web_App_Penetration_Testing_Course.part2.rar.html
https://uploadgig.com/file/download/A435bb2Eb8A8f9f1/Burp_Suite_Apprentice_Web_App_Penetration_Testing_Course.part2.rar
https://uploadgig.com/file/download/Bb1a4029Ed433aC3/Burp_Suite_Apprentice_Web_App_Penetration_Testing_Course.part1.rar
Poproshajka




Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.