Ethical Hacking ITRONIX CERTIFIED

Web Penetration Testing Industrial Training

 

CHAPTER 1: Introduction to Web Applications

  1. Overview of the Penetration Testing and it’s types
  2. Overview of the Web from the penetration tester’s view
  3. Difference between the Websites/Web Apps/Web-Servers
  4. Confusion of what to hack??
  5. Exploring the server-client architecture
  6. Building of the test-beds for pentesting

CHAPTER 2: Exploring the Vulnerabilities

  1. Working of the complete session state works of the web
  2. Exploring and Gathering the different types of vulnerabilities (in RAW)
  3. Methods to focus only on the vulnerability
  4. Exploring the URL and the build part of SSL layer and It’s weakness.
  5. Crawling into the pool of Spidering the websites
  6. Working of the Browsers, HTTP based Protocols and their Request Methods
  7. The Exploitation phases and it’s complete following path algorithms
  8. Types of Web-Apps attacks

CHAPTER 3: The XSS based attacks (Basic to Advance)

  1. Introduction to the XSS
  2. Discovering of the back-end raw codes.
  3. Learning the basic JavaScript
  4. Preparing and Working of the test-beds for XSS based JavaScript codes
  5. Types of the XSS attacks in live world
  6. Testing for the XSS based attacks
  7. Stored Types of XSS
  8. I-frame based XSS attacks
  9. Cookie Stealing based XSS attacks
  10. Reflected XSS basic testing
  11. Reflected XSS of displaying the value over the URL
  12. Cookie Stealing through Reflected XSS

CHAPTER 4: Cross Site Script Forgery

  1. Introduction to CSRF
  2. Working of the CSRF vulnerability
  3. Complete working of Session Tokens/Tokens and Session ID’s
  4. Flow-Chart designing of the complete attack
  5. Algorithm for the working of the attack.
  6. Practical Working of the Attack
  7. Basic testing for the working of CSRF attack
  8. Working on the URL’s for the test-bed CSRF attacks
  9. Completely Rooting the user panels to the main rooted panels.

CHAPTER 5: Remote Command Execution Attack

  1. Introduction to Linux and Windows kernel shell
  2. Working on the basic commands of Linux
  3. Working of the networking related to Linux
  4. Complete configuring of the apache2 and the tomcat servers
  5. Introduction to the Remote Command Execution
  6. Working of the RCE to the server-end.
  7. Working of the RCE to the client-end.
  8. Exploitation of the servers from the client and server end through RCE
  9. Extraction of the password files from inside the servers
  10. Working of the netcat and it’s reverse_tcp back-connections
  11. Creating the test-bed of RCE to the main attacker’s panel
  12. Displaying the complete server configured by exploiting the RCE

CHAPTER 6: Structured Query Language Injection

  1. Introduction to the SQL
  2. Working on the basics of the SQL
  3. String Based SQL Injection
  4. Get Error Based – Single Quotes SQL Injection
  5. Get Error Based – Integer Based SQL Injection
  6. Get Error Based – Double Quotes Bases SQLI
  7. Double Query Based SQL Injection
  8. Blind – Boolean based SQLI
  9. Blind — Time Based SQLI
  10. Cookie Based SQLI

CHAPTER 7: ISR – Internet Stealers

  1. Introduction to Stealers
  2. Types of Stealers
  3. Configuring of the Stealers
  4. Stealing the passwords from the browsers
  5. Stealing from the web-apps configured

CHAPTER 8: LFI and RFI based Attacks

  1. Overview of the LFI and RFI based Attacks
  2. Working of the LFI and RFI attacks
  3. Uploading of the php based shells through LFI

CHAPTER 9: Working of the Burp Suite

  1. Configuring the Metasploit with command execution
  2. Introduction to Burp-Suite
  3. Introduction to the Man-In-The-Middle Attack
  4. Using the Burp Suite to perform the MITM attacks
  5. Using the Burp Suite to perform the Spider Based Functions
  6. Using the Burp Suite to exploit the SQLI based test-beds.

Wireless Penetration Testing Training Jalandhar

Wireless Penetration Testing Training Jalandhar

Wireless Penetration Testing Training Jalandhar

Wireless Penetration Testing Training Jalandhar

Wireless Penetration Testing Training Jalandhar

Wireless Penetration Testing Training Jalandhar

Wireless Penetration Testing Training Jalandhar

Wireless Penetration Testing Training Jalandhar

Wireless Penetration Testing Training Jalandhar

Wireless Penetration Testing Training Jalandhar
Wireless Penetration Testing Training Jalandhar

Wireless Penetration Testing Training Jalandhar Wireless Penetration Testing Training Jalandhar Wireless Penetration Testing Training Jalandhar Wireless Penetration Testing Training Jalandhar Wireless Penetration Testing Training Jalandhar Wireless Penetration Testing Training Jalandhar Wireless Penetration Testing Training Jalandhar Wireless Penetration Testing Training Jalandhar Wireless Penetration Testing Training Jalandhar Wireless Penetration Testing Training Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Jalandhar Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab Wireless Penetration Testing Training in Punjab

 

Leave a Reply

Your email address will not be published. Required fields are marked *