K_Ethical Hacking_ Website and Web Application Testing

00_01_ Introduction.
00_02_ What_you_should_know.
00_03_ Disclaimer.
01_01_ Elements_of_web_applications.
01_02_ Dissecting_the_HTTP_protocol.
01_03_ Moving_on_to_WebSockets.
01_04_ Looking_at_Googles_QUIC_protocol.
01_05_ Understanding_cookies.
01_06_ Introducing_HTML.
01_07_ Visiting_OWASP.
02_01_ Installing_the_HacMe_Casino.
02_02_ Installing_the_WebGoat_server.
02_03_ Installing_and_using_the_Vega_scanner.
02_04_ Intercepting_web_traffic_with_teh_Vega_proxy.
02_05_ Introducing_Burp_Suite.
02_06_ Proxying_with_ZAP.
02_07_ Using_the_OWASP_ Framework.
02_08_ Introducing_Web_Scarab.
03_01_ Fingerprinting_web_servers.
03_02_ Looking_for_credentials_in_HTML_code.
03_03_ Using_Cookie_Digger.
03_04_ Hijacking_sessions_through_cookies.
04_01_ Manipulating_the_URL.
04_02_ Testing_for_SQL_injections.
04_03_ Cross_site_scripting.
04_04_ Injecting_commands_through_the_URL.
05_01_ Cracking_the_bank.
05_02_ Hacking_the_cheese.
05_03_ Training_in_the_Web_Security_Dojo.
06_01_ Whats_next.

Comments