Python goes up against Damn Vulnerable Web Application - who would win this battle???
What if you had to pentest DVWA - and all your tools were taken away? The only thing you have is Python, and IDE, and browser. How effective could you be?
This course answers those questions as we work through over a dozen different objectives - all designed to pentest DVWA.
Over the next few hours, we're going to have some fun and learn a few things as we approach conducting a penetration test against Damn Vulnerable Web Application. The catch is that we'll be using nothing but Python code we write. No other tools allowed... After taking this course you'll be able to write console and desktop GUI applications to assist with penetration testing activities. Best of all - you'll be writing your own scripts that duplicate the functionality of well-known testing tools like: Nmap Wireshark Burp Suite OWASP ZAP Metasploit And more! Learn to detect and exploit OWASP Top Ten vulnerabilities using only Python! Insecure Design Broken Authorization Injection Security Misconfiguration Cryptographic Failures And more!
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.