Learn Website Hacking / Penetration Testing From Scratch
Learn Website Hacking / Penetration Testing From Scratch
Learn Website Hacking / Penetration Testing From Scratch
This is the first section in which you will be introduced to the course.
Course Introduction
Get an overview of the structure of the course and what you will learn in it.
In this section, you will get an overview of the lab setup and the software required for this
course.
Know the software required for this course and learn how to install Kali as a virtual machine.
Learn how to setup a Windows virtual machine to try and hack into it to practice penetration
testing.
In this section, you will get familiar with Kali Linux, basic Linux commands and the network
configuration settings.
Learn how to interact with the Linux terminal and run linux commands.
Learn how to configure the network settings for the lab machines and how to access the
websites that you will attempt to hack from the Kali machine.
In this section, you will learn about websites and how to hack them.
What is a Website?
How to Hack a Website?
Learn various methods and approaches that can be used to hack into a website.
In this section, you will learn how to gather information about the target website like the
technologies used, DNS information, other websites on the same server as the target website,
subdomains, and sensitive files and analyze the data collected.
Learn how to gather information about the website/ domain name owner, server IP address,
hosting company and more.
Learn how to gather detailed DNS information about the target website such as its DNS records,
resources it shares with other websites and more.
Discover websites on the same server as your target website, to use them to gain access to your
target website.
Use the Dirb tool to discover files on the target website that contain sensitive data.
Analyze the files you discovered earlier and check the information they contain.
Learn about Maltego, which is a great information gathering tool and use it to discover
domains, websites, servers, and emails associated with your target.
Dive deeper into Maltego and learn how to discover more information about the target such as
admins email, hosting company and servers.
What are they? And How to Discover & Exploit Basic File Upload Vulnerabilities
HTTP Requests - GET & POST
Intercepting HTTP Requests
Exploiting Advanced File Upload Vulnerabilities
Exploiting More Advanced File Upload Vulnerabilities
[Security] Fixing File Upload Vulnerabilities
6.1 What are they? And How to Discover & Exploit Basic File Upload Vulnerabilities
Learn how to discover and exploit file upload vulnerabilities to gain control over the target
server.
Learn more about how websites work, how the browser communicates with the web server,
http requests types and how to exploit this method of communication.
After learning how to intrercept HTTP requests, you can now exploit a more secure file upload
vulnerability and gain full control over the target web server.
Have a look at an even more secure upload page and learn how to exploit this file upload
functionality and gain full control over the target web server.
Have a look at the code causing vulnerabilities, learn why they are exploitable, how to fix these
pages and prevent file upload vulnerabilities.
In this section, you will learn about code execution vulnerabilities, how to discover and exploit
them and also fix them.
What are they? & How to Discover & Exploit Basic Code Execution Vulnerabilities
Exploiting Advanced Code Execution Vulnerabilities
[Security] - Fixing Code Execution Vulnerabilities
7.1 What are they? & How to Discover & Exploit Basic Code Execution Vulnerabilities
Know what code execution vulnerabilities are, learn how to discover and exploit them to get a
reverse shell and gain full control over the target server.
Learn how to exploit some more code execution vulnerabilities to get a reverse shell and gain
full control over the target server.
Explore the code causing vulnerabilities, know why they are exploitable and learn how to fix
them and secure pages from file code execution vulnerabilities.
In this section, you will learn about local file inclusion vulnerabilities, how to discover and
exploit them, to get control over the target web server.
8.1 What are they? And How to Discover & Exploit Them
Learn how to discover and exploit local file inclusion vulnerabilities to read any file on the
target web server.
Learn how to use local file inclusion to get reverse shell and gain full control over the target
web server.
Learn another method to use local file inclusion to get reverse shell and gain full control over
the target web server.
Learn how to discover and exploit remote file inclusion vulnerabilities to get a reverse shell and
gain full control over the target server.
Learn how to discover and exploit some more remote file inclusion vulnerabilities to get a
reverse shell and gain full control over the target server.
Have a look at the code causing vulnerabilities, learn why they are exploitable and how to fix
them and secure pages from file inclusion vulnerabilities.
In this section, you will learn why SQL injection vulnerabilities are considered one of the most
dangerous vulnerabilities.
What is SQL?
Dangers of SQL Injections
Learn about SQL and its use before diving into SQL injection vulnerabilities.
Learn why SQL injection vulnerabilities are considered one of the most dangerous
vulnerabilities and what it can be used for.
Section 11: SQL Injection Vulnerabilities - SQLi In Login Pages
In this section, you will learn how to discover SQL injections in POST, bypassing logins using SQL
injections and how to prevent them.
Learn how tobypass login formsif the inputs are injectable, this will allow you tologin as any
user without a password.
Learn how tobypass security measurements in login forms, also learn how tobypass client side
filtering and login as admin without a password.
Have a look at the code causing vulnerabilities and learn why the vulnerabilities are exploitable
and how to fix them.
Section 12: SQL injection Vulnerabilities - Extracting Data from the Database
In this section, you will learn how to use SQL injection vulnerabilities to obtain database
information and extract sensitive data.
Learn how to discover SQL injections in GET requests i.e. in URL parameters.
Use all the discovered information to find the usernames and passwords of all the users on the
website.
In this section, you will learn some advanced exploitation techniques using SQL injection
vulnerabilities and how to prevent them.
Learn how to bypass more security measurements and successfully obtain usernames and
passwords stored in the database.
13.4 Bypassing Security & Accessing All Records
Learn how to bypass security by iterating over all the records and access all records together.
13.7 Reading & Writing Files on The Server Using SQL Injection Vulnerability
13.8 Getting a Reverse Shell Access & Gaining Full Control Over The Target Web Server
Learn how to get a reverse shell access and gain control over the target web server using SQL
injection vulnerabiliites.
Explore SQLmap that can be used to perform attacks and much more.
Learn how to use SQLmap that can be used to get a system shell where you can directly interact
with the database and run SQL queries.
Check the code causing the vulnerabilities; know why the vulnerabilities are exploitable and
how to properly write web applications that are not vulnerable to SQL injections.
In this section, you will learn about Cross Site Scripting vulnerabilities and how to discover and
exploit basic and advanced Cross Site Scripting vulnerabilities.
Learn how to discover and exploit more advanced reflected XSS vulnerabilities.
Learn how to discover and exploit even more advanced reflected XSS vulnerabilities.
Learn what are Dom based XSS vulnerabilities and how to discover them.
In this section, you will learn how to use XSS vulnerabilities to hook targets to BeEF, install the
Veil framework and generate a backdoor with it and also fix the XSS vulnerabilities.
Learn how to use reflected XSS vulnerabilities to hook targets to BeEF which is a browser
exploitation framework that allows you to run a large number of commands on hooked
browser. Once victims are hooked you can run all the attacks BeEF allows you to such as
injecting a keylogger or gaining full control over the target machine.
Learn how to use stored XSS vulnerabilities to hook targets to BeEF. Once victims are hooked
you can run all the attacks BeEF allows you to such as injecting a keylogger or gaining full
control over the target machine.
Learn how to run basic commands on the target machine using BeEF.
Learn how to use BeEF to display a fake login dialog to the target user and steal the password
they enter.
Get an overview of the Veil framework and its basic commands. Also learn what is payload and
the different types of payloads that can be generated with Veil.
Learn how to create an undetectable backdoor using Veil that is not detectable by antivirus
programs.
15.9 Bonus - Listening For Incoming Connections
Learn how to listen to incoming connections from the backdoor you created earlier.
15.10 Bonus - Using a Basic Delivery Method to Test the Backdoor & Hack Windows 10
Test the backdoor that you created to ensure that it works as expected.
Use BeEF to create afake notification bartelling the user that there is a new update, the update
is actually a backdoor. Once they install that update, you will gain full control over the target
machine.
Check the code causing the vulnerabilities, learn why they are exploitable, how to fix them and
secure pages from them.
In this section, learn how to access accounts by manipulating cookies, exploit CSRF
vulnerabilities and prevent CSRF vulnerabiliites.
Learn how to login to any account on a website that uses in-secure session management
without knowing the password.
Learn about cross site request vulnerabilities, why they are dangerous and how to exploit them.
16.3 Exploiting CSRF Vulnerabilities to Change Admin Password Using a HTML File
Learn how to exploit CSRF vulnerabilities, learn how to create a HTML file that can change the
password of the person who opens it without them even knowing.
16.4 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link
Learn a more advanced method to exploit CSRF vulnerabilities, learn how to generate a URL
that would change the password of anybody who clicks on it without the person knowing it.
In this section, you will learn about Brute force and Dictionary attacks, the difference between
them, creating a wordlist and using the Hydra tool to launch attacks.
Learn what are brute force and dictionary attacks, the difference between them and their uses.
17.3 Launching a Wordlist Attack & Guessing Login Password Using Hydra
Use Hydra- a tool used to launch brute force attacks, to launch a dictionary attack against a
login page and guess the password.
In this section, you will learn how to use the Owasp tool to automatically discover
vulnerabilities and configure a scan against your target website.
Learn how to use OWasp to automatically discover vulnerabilities and learn how to configure
and start a scan against your target website.
18.2 Analysing Scan Results
This section introduces you to the activities that are done after the website has been exploited.
19.2 Interacting With the Reverse Shell Access Obtained In Previous Lectures
Learn how to interact with the reverse shell access obtained by exploiting the vulnerabiliites in
the previous lectures.
Learn how to upload files to the target server using the shell access you have.
19.4 Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc
Learn the basics of using the weevely shell like running basic commands, getting system
information and navigate between websites on the same server.
Learn how to bypass limited privileges and execute system commands on the target web server
using Weevely.
Learn how to download files from the target webserver to your machine.
19.7 Uploading Files to Target Webserver
Learn how to upload files like scripts, exploits, etc from your computer to the target web server.
Learn how to access the database of the webserver you hacked. Find database information and
use it to either connect to the database to run SQL commands or download the whole database
to your local machine.