Companies Home Search Profile

Ethical Hacking - Python vs DVWA

Focused View

Pack Of Coders - POC

3:24:21

98 View
  • 001 Introduction.mp4
    02:20
  • 002 How Does This Help My Career.mp4
    02:19
  • 003 Ethics.mp4
    01:09
  • 001 Lab Network.mp4
    04:10
  • 002 Web Security Dojo and DVWA.mp4
    02:15
  • 003 Lab Structure.mp4
    04:25
  • 001 Socket Fundamentals.mp4
    03:51
  • 002 TCP Client and Server.html
  • 003 HTTP Fundamentals.mp4
    10:01
  • 004 HTTP GET Operations.mp4
    01:54
  • 005 HTTP POST Operations.mp4
    02:56
  • 006 HTTP Sessions.mp4
    02:23
  • 001 Host Port Scanning.mp4
    03:25
  • 002 Development.mp4
    03:41
  • 003 Demonstration and Report.mp4
    05:20
  • 001 Headers, Options, and Cookies.mp4
    01:34
  • 002 Development.mp4
    03:02
  • 003 Demonstration and Report.mp4
    04:37
  • 001 Packet Capture and Inspection.mp4
    02:19
  • 002 Development.mp4
    02:53
  • 003 Demonstration and Report.mp4
    08:18
  • 001 Brute Forcing the Main DVWA Login.mp4
    02:42
  • 002 Development.mp4
    01:45
  • 003 Demonstration and Report.mp4
    04:47
  • 001 Adjusting the DVWA Security Level.mp4
    03:17
  • 002 Development.mp4
    02:54
  • 003 Demonstration and Report.mp4
    03:58
  • 001 Finding Pages.mp4
    01:58
  • 002 Development.mp4
    01:30
  • 003 Demonstration and Report.mp4
    05:59
  • 001 Reflected XSS Detection.mp4
    02:43
  • 002 Development.mp4
    03:09
  • 003 Demonstration and Report.mp4
    05:41
  • 001 Enumerating Application Identifiers.mp4
    03:24
  • 002 Development.mp4
    02:31
  • 003 Demonstration and Report.mp4
    04:40
  • 001 Testing for SQL Injection.mp4
    02:36
  • 002 Development.mp4
    01:42
  • 003 Demonstration and Report.mp4
    04:50
  • 001 Detecting Command Injection Flaws.mp4
    02:49
  • 002 Development.mp4
    01:59
  • 003 Demonstration and Report.mp4
    03:26
  • 001 Leveraging Command Injection to Load a Web Shell.mp4
    02:23
  • 002 Development.mp4
    02:12
  • 003 Demonstration and Report.mp4
    04:22
  • 001 Accessing Local Files.mp4
    01:52
  • 002 Development.mp4
    01:58
  • 003 Demonstration and Report.mp4
    04:40
  • 001 UI Design - Brute Force Login Testing.mp4
    02:50
  • 002 Development.mp4
    09:45
  • 003 Demonstration.mp4
    04:50
  • 001 UI Design - Injection Testing.mp4
    02:03
  • 002 Development.mp4
    07:35
  • 003 Demonstration.mp4
    05:10
  • 001 Converting Python Scripts to EXE Files.mp4
    01:20
  • 002 Basic Python Web Server.mp4
    03:58
  • 001 Code Examples.mp4
    00:49
  • bruteloginmain.zip
  • bruteui.zip
  • client.zip
  • cmdinject.zip
  • fileinc.zip
  • get.zip
  • getcookies.zip
  • getheaders.zip
  • getstatus.zip
  • injectui.zip
  • options.zip
  • pages.zip
  • passwdlist.zip
  • portscan.zip
  • post.zip
  • reflectedxss.zip
  • server.zip
  • session.zip
  • setsecurity.zip
  • sniffhttp.zip
  • sqlinject.zip
  • statushttp.zip
  • userenum.zip
  • userlist.zip
  • webshell.zip
  • 001 Tools We've Replicated.mp4
    03:33
  • 002 Vulnerabilities We've Discovered.mp4
    03:12
  • 003 Summary and Thank You.mp4
    00:37
  • Description


    Have some fun and build your Python and Ethical Hacking Skills

    What You'll Learn?


    • Innovative Course Designed to Teach Ethical Hacking
    • Use Python to Replicate Functionality Like Nmap, Burp Suite, OWASP ZAP, and More!
    • Leverage Python to Conduct a Web Application Penetration Test
    • Design and Build a UI for Web Application Injection Testing
    • Learn to Create a UI for Brute Force Login Testing
    • Collect Data Through the Development and Use of Packet Capture Scripts
    • Develop Scripts for Host Scanning and Header Inspection
    • Develop Code to Brute Force Login and Lower Security Controls
    • Create Python Code to Execute Web Exploits - XSS, SQL Injection, LFI, and More!

    Who is this for?


  • Anyone Interested in Ethical Hacking or Python
  • Python Developers That Want Exposure to Ethical Hacking
  • Penetration Testers Who Want to Expand Their Skills with Python
  • What You Need to Know?


  • Basic IT Skills
  • Basic Understanding of Python
  • Basic Understanding of Penetration Testing
  • More details


    Description


    Python goes up against Damn Vulnerable Web Application - who would win this battle???


    What if you had to pentest DVWA - and all your tools were taken away?  The only thing you have is Python, and IDE, and browser.  How effective could you be?


    This course answers those questions as we work through over a dozen different objectives - all designed to pentest DVWA. 


    Over the next few hours, we're going to have some fun and learn a few things as we approach conducting a penetration test against Damn Vulnerable Web Application.  The catch is that we'll be using nothing but Python code we write.  No other tools allowed...


    After taking this course you'll be able to write console and desktop GUI applications to assist with penetration testing activities.


    Best of all - you'll be writing your own scripts that duplicate the functionality of well-known testing tools like:

    • Nmap

    • Wireshark

    • Burp Suite

    • OWASP ZAP

    • Metasploit

    • And more!


    Learn to detect and exploit OWASP Top Ten vulnerabilities using only Python!

    • Insecure Design

    • Broken Authorization

    • Injection

    • Security Misconfiguration

    • Cryptographic Failures

    • And more!


    Each lesson is designed around a specific test scenario.  We describe the approach that will used and walk through the Python code we develop to meet the test objective.  Then we put our script into action against DVWA and see the results!


    This is a fun exercise to build ethical hacking and Python coding skills:

    • Excellent for security professionals interested in Python

    • Equally good for Python professionals interested in security and ethical hacking


    Let's answer the age old question - just how vulnerable is Damn Vulnerable Web Application?

    DVWA sounds kind of weak. Python sounds strong and scary...like a dangerous animal.

    Place your bets on the winner now....

    Who this course is for:

    • Anyone Interested in Ethical Hacking or Python
    • Python Developers That Want Exposure to Ethical Hacking
    • Penetration Testers Who Want to Expand Their Skills with Python

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pack Of Coders - POC
    Pack Of Coders - POC
    Instructor's Courses
    Pack Of Coders provides online technology training, publishing, and consulting services.  Training is targeted at various skill levels and seeks to provide students with a better understanding of technology, software development practices, and cybersecurity topics.  Major course offerings include:Targeted training through our Rapid Skill Boost series - designed to help you hit the ground running on a new technology. Our Essential Skills series of courses quickly gets you trained on foundational  elements of a technology or tool.If you're working towards certifications, then our Exam Coaching sessions are just what you need.  These courses help you navigate the questions you might face on exam day!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 59
    • duration 3:24:21
    • English subtitles has
    • Release Date 2022/11/22