Companies Home Search Profile

Ethical Hacking: File Inclusion

Focused View

Peter A

57:37

4 View
  • 1. What is File Inclusion.mp4
    05:52
  • 2. Path Traversal.mp4
    11:40
  • 3. Local File Inclusion.mp4
    05:32
  • 4. Remote File Inclusion.mp4
    03:02
  • 5. Mitigation.mp4
    02:49
  • 6. Example Hack (Brute).mp4
    13:14
  • 7. Example Hack (Shadow).mp4
    15:28
  • Description


    Hack using LFI

    What You'll Learn?


    • How to Hack a Server using LFI
    • How Local File Inclusion vulnerability works
    • How Remote File Inclusion vulnerability works
    • How to Mitigate these vulnerabilities

    Who is this for?


  • Beginner Ethical Hackers
  • Software Developers
  • Sysadmins
  • Devops
  • What You Need to Know?


  • Kali Linux Live USB or Virtualbox image
  • Some programming knowledge helps
  • More details


    Description

    In this course you will learn about Local File Inclusion (LFI), Remote File Inclusion (RFI) and other vulnerabilities that may exist in web apps. You will learn how to prevent them as a developer and how you can leverage them to hack into servers. The course contains examples hack, that you could try on your own home lab.

    For this vulnerability to work, the website needs to have a file inclusion vulnerability. But, if it's present you might either hack the server directly or indirectly through another protocol like SSH or RDP.  The course will also show you about the steps every hacker takes, regardless of what is the target. You'll learn how to scan for apps running on a server and how you might disclose if the target is running a Linux or Windows server.

    If you are new to hacking, this course is for you. You'll be able to hack a server, given this vulnerability is present in the web app. It's a beginners course and you don't need any prior experience. No programming experience is needed, but we will go over a tiny bit of programming. However, as this is a hacking course the main focus is on that.



    Who this course is for:

    • Beginner Ethical Hackers
    • Software Developers
    • Sysadmins
    • Devops

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Ethical Hacker with Software Development background. I first started programming long ago as a hobby and along the way learned many things. I've programmed in basic, c++, java and many other languages. I'm programming as a hobby. I've used a variety of operating systems and also database systems. I'm here to share my experience. Then I got into Ethical Hacking
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 7
    • duration 57:37
    • Release Date 2024/03/12