Oreilly - Ethical Hacking: Hacking Applications
by Chad Russell | Publisher: Stone River eLearning | Release Date: October 2017 | ISBN: 100000006A0717
This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. Next you will learn how to conduct XSS attacks, buffer overflows and then learn how to hack AJAX.
- Hacking Applications
- Application Architecture and Security 00:07:56
- Hamster and Ferret 00:05:57
- Morpheus 00:04:22
- Heap Spraying Demonstration 00:04:30
- OWASP Zed Attack Proxy 00:12:13
- Persistent XSS Demo 00:01:53
- Buffer Overflow Demonstration 00:04:37
- Buffer Overflows Explained 00:23:18
- Hacking AJAX 00:09:26
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.