Companies Home Search Profile

Introduction to Web Application Penetration Testing

Focused View

9:51:20

0 View
  • 1 -Personal Introduction.mp4
    01:22
  • 2 -Introduction to the course.mp4
    09:04
  • 2 -chatgpt ai.zip
  • 2 -pentest gpt ai.zip
  • 2 -whiterabbitneo ai.zip
  • 1 -Installing Kali Linux.mp4
    46:56
  • 1 -firmware cutter installation link use wget on the ftp link.zip
  • 1 -firmware download page.zip
  • 1 -firmware installer download page use wget on ftp link.zip
  • 1 -kali linux downloads.zip
  • 1 -procedures for installing wifi drivers github.zip
  • 1 -webfs download page use wget on the ftp link.zip
  • 2 -Installing OWASP ZAP.mp4
    04:37
  • 2 -owasp zap.zip
  • 3 -Configuring Burpsuite.mp4
    05:24
  • 4 -Websites we will use.mp4
    04:01
  • 4 -hostedscan.zip
  • 4 -whiterabbitneo ai.zip
  • 5 -Installing and Configuring ngrok.mp4
    20:42
  • 5 -cockli website.zip
  • 5 -ngrok website.zip
  • 5 -protonmail.zip
  • 6 -Installing Wappalyzer.mp4
    03:42
  • 7 -Using Nikto to find Vulnerabilities.mp4
    14:56
  • 7 -nikto online.zip
  • 7 -vulnhub exploit guide.zip
  • 8 -Finding Vulnerable Web Application Ports using Network Mapper.mp4
    11:23
  • 9 -Using GoBuster.mp4
    06:57
  • 10 -Installing GoBuster.mp4
    07:57
  • 1 -Understanding Bug Bounties and HackerOne.mp4
    06:45
  • 1 -hackerone.zip
  • 2 -Exploiting Remote Code Execution Vulnerability (Automatic and AI).mp4
    34:03
  • 2 -hackerone.zip
  • 2 -securitytrails.zip
  • 2 -shodan.zip
  • 3 -Exploiting SQL Injection Vulnerability (Automatic).mp4
    10:31
  • 3 -sql injection portswigger academy.zip
  • 4 -Exploiting Subdomain Takeover Vulnerability (Automatic).mp4
    47:09
  • 4 -certificate search.zip
  • 4 -chaos search.zip
  • 4 -ffuf github.zip
  • 4 -httpx github.zip
  • 4 -katana github.zip
  • 4 -subfinder github.zip
  • 4 -subzy github.zip
  • 5 -Exploiting Privacy Violation Vulnerability (Automatic).mp4
    19:59
  • 5 -nuclei github.zip
  • 5 -trufflehog github.zip
  • 6 -Using Nuclei Verbose Mode to find Vulnerable Endpoints (Automatic).mp4
    12:32
  • 7 -Using Katana to find Vulnerable Endpoints (Automatic).mp4
    06:06
  • 7 -katana github.zip
  • 8 -403 bypass tool github.zip
  • 8 -Exploit to bypass Error 403 (Automatic).mp4
    12:20
  • 9 -Exploiting Missing SRI Vulnerability (Automatic).mp4
    06:59
  • 9 -project discovery nuclei.zip
  • 9 -sri script.zip
  • 10 -Using OWASP ZAP for Auto-Manual Vulnerability Detection (Automatic).mp4
    10:25
  • 11 -Exploiting Open Redirect Vulnerability (Automatic).mp4
    08:08
  • 11 -open redirect tester.zip
  • 12 -Exploiting Account Takeover Vulnerability (Manual).mp4
    11:56
  • 13 -Exploiting Stored XSS Vulnerability (Manual).mp4
    15:57
  • 13 -js2pdfinjector github.zip
  • 14 -Exploiting OTP Overflow (Manual).mp4
    08:13
  • 15 -Exploiting Insecure Direct Object Reference (Manual).mp4
    25:24
  • 15 -idor lab portswigger academy.zip
  • 16 -Exploiting XSS Vulnerability (Manual).mp4
    15:24
  • 16 -bepractical.zip
  • 16 -bepractical youtube channel.zip
  • 16 -google hacking database.zip
  • 16 -xss vibes.zip
  • 17 -Advanced Google Hacking Techniques (Auto-Manual).mp4
    07:12
  • 17 -dork search.zip
  • 17 -google hacking database.zip
  • 18 -Exploiting Local File Inclusion and Directory Transversal (Manual).mp4
    25:41
  • 18 -local file inclusion lab portswigger academy.zip
  • 19 -Exploiting Remote File Inclusion (Manual).mp4
    17:11
  • 19 -rce payload github.zip
  • 19 -remote file inclusion portswigger lab.zip
  • 20 -Exploiting Cross Site Request Forgery (Manual).mp4
    15:45
  • 20 -csrf lab portswigger academy.zip
  • 20 -csrf github.zip
  • 21 -Exploiting Server Side Request Forgery (Manual).mp4
    24:25
  • 21 -ssrf lab portswigger academy.zip
  • 21 -using nuclei scripts for pentesting.zip
  • 22 -Advanced GitHub Hacking Techniques (Manual).mp4
    09:35
  • 22 -github hacking syntaxes.zip
  • 23 -Bypassing Web Application Firewalls (Manual).mp4
    25:24
  • 23 -waf bypass.zip
  • 24 -Exploiting Cross Origin Resource Sharing Vulnerability (Manual).mp4
    19:56
  • 24 -cors github.zip
  • 24 -cors portswigger.zip
  • 25 -Exploiting Clickjacking Vulnerability (Manual).mp4
    32:08
  • 25 -clickjacking vulnerability test github.zip
  • 25 -clickjacking portswigger academy.zip
  • 1 -Report Writing.mp4
    23:52
  • 2 -Conclusion.mp4
    01:19
  • Description


    Learn how to perform penetration tests on web applications for bug bounty hunting and exploit a potential vulnerability

    What You'll Learn?


    • Using Generative AI to get predictions for Penetration Tests
    • Using reconnaissance tools to gather information on the vulnerable endpoint
    • Manually assessing a web application without automatic penetration testing tools
    • Using automatic penetration testing tools
    • Building Exploits for Web Applications
    • Understanding False Negatives when using automated penetration testing tools

    Who is this for?


  • Advanced Learners on Web Application Penetration Testing
  • Beginner Learners on Web Application Penetration Testing
  • What You Need to Know?


  • HTML
  • PHP
  • Python
  • Bash Scripting
  • JavaScript
  • More details


    Description

    In this course, you’ll learn the basics of performing basic penetration tests on web applications manually and using automated penetration testing tools with the help of different Artificial Intelligence that exist out there. We will compare the differences and answers given by three different AI’s including ChatGPT, PenTestGPT and WhiteRabbitNeo AI and see the negative sides of using AI as a whole when performing these penetration tests. We will perform some manual tests without using automated tools to better understand how vulnerabilities can be exploited without getting any false negatives that are present when using AI and automation for penetration tests; I will also disclose a duplicate report that I obtained permission for to disclose to the public which I was allowed to disclose, so you have an idea on how to write reports to HackerOne and other Web Application Penetration Testing Bug Bounties and Vulnerability Disclosure Programs.


    Please note that this course is for educational purposes only. This course is intended to teach people to perform ethical hacking and contains highly sophisticated cybersecurity techniques which can be used by anyone. Do not use anything taught in this course illegally, I will not be responsible for any damage or harm caused to a system from what you learn and apply from this course. This course is for people who want to become Bug Bounty Hunters and White Hat Hackers to prepare and refresh them for a better world of security and help in mitigating cyber risks.

    Who this course is for:

    • Advanced Learners on Web Application Penetration Testing
    • Beginner Learners on Web Application Penetration Testing

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 39
    • duration 9:51:20
    • Release Date 2025/03/07