Oreilly - Hands-On Web Penetration Testing with Kali Linux
by Rassoul Ghaznavi Zadeh | Publisher: Packt Publishing | Release Date: September 2018 | ISBN: 9781789132311
Test web security with Kali Linux and perform professional-level web penetration testingAbout This VideoUse Kali Linux for web penetration tests and expose vulnerabilities on web applicationsPerform web penetration testing to exploit vulnerable systemsUnderstand the process of penetration testing and the importance of security as part of web application developmentIn DetailKali Linux contains a large number of penetration testing tools from various different niches in the security and forensics fields. Kali Linux offers a multitude of options to scan a single IP, port, or host (or a range of IPs, ports, and hosts) and discover vulnerabilities and security holes. The output and the information this provides can serve as a precursor to penetration testing efforts.Have you ever wondered how to test web applications security? This course will teach you about web application vulnerabilities and how to use Kali Linux tools to perform web penetration testing to professional standards. You will start with application security and learn about the process of web penetration testing. Then you'll create a test lab with Oracle VirtualBox and Kali Linux. Next, you'll learn about common vulnerabilities in web applications with practical examples, which will help you understand the process of penetration testing and the importance of security. Now you'll be introduced to different tools to assess and analyze web application vulnerabilities. In the end, you'll learn to secure web applications.By the end of the course, you'll be able to perform web penetration testing using Kali Linux.The code bundle for this course is available at https://github.com/PacktPublishing/Hands-on-Web-Penetration-Testing-with-Kali-Linux.
- Chapter 1 : Application Security
- The Course Overview 00:02:44
- Web Application and Security 00:03:31
- OWASP Top 10 00:03:58
- Vulnerability Assessment versus Penetration Testing 00:04:18
- Ethical Hacker Responsibilities and Customer Expectations 00:03:52
- Chapter 2 : Creating a Test Lab with Kali Linux
- Software and Hardware Requirements 00:03:08
- Diagram and Design 00:03:56
- Connectivity and Testing 00:07:23
- Chapter 3 : Web Application Vulnerabilities
- Getting to Know the DVWA Interface 00:03:18
- Brute Force, CSRF, and File Inclusion 00:05:38
- SQL Injection 00:06:01
- Cross-Site Scripting (XSS) 00:05:05
- Command Execution 00:04:36
- Chapter 4 : Vulnerability Testing and Penetration
- OWASP-ZAP 00:05:23
- OWASP-ZAP Authenticated Scan 00:09:10
- Burp Suite – Part 1 00:07:58
- Burp Suite – Part 2 00:08:37
- Chapter 5 : Securing Web Applications
- Development Security 00:07:29
- Web Application Firewalls 00:07:11
- Mod_Security 00:07:56
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.