 
                        Learning Outcome:
Requirement:
                          Course Curriculum
                        
                        
                      
                      
                        
                          
  
    
      
         
      
      Recipe 7: Exploiting the Web Applications
      
        
          Available in
          
          days
        
        
          
          days
          after you enroll
        
      
    
    
      
      - 
        
          
          
            
              Preview
            
          
          Understand the OWASP Top 10
          
            (9:45)
          
        
      
- 
        
          
          
            
              Start
              
          
          Setup the Web application pentesting lab
          
            (10:21)
          
        
      
- 
        
          
          
            
              Start
              
          
          Sensitive Data exposure and Directory listing
          
            (17:36)
          
        
      
- 
        
          
          
            
              Start
              
          
          Access Control & Authentication using Burpsuite
          
            (18:54)
          
        
      
- 
        
          
          
            
              Start
              
          
          Mastering the SQL-Injection
          
            (38:08)
          
        
      
- 
        
          
          
            
              Start
              
          
          Find & Exploit Cross-site-scripting (XSS)
          
            (23:01)
          
        
      
- 
        
          
          
            
              Start
              
          
          Command Injection & LFI
          
            (22:45)
          
        
      
     
					
- 
        
          
          
            PreviewUnderstand the OWASP Top 10 (9:45)
- 
        
          
          
            StartSetup the Web application pentesting lab (10:21)
- 
        
          
          
            StartSensitive Data exposure and Directory listing (17:36)
- 
        
          
          
            StartAccess Control & Authentication using Burpsuite (18:54)
- 
        
          
          
            StartMastering the SQL-Injection (38:08)
- 
        
          
          
            StartFind & Exploit Cross-site-scripting (XSS) (23:01)
- 
        
          
          
            StartCommand Injection & LFI (22:45)
Your Instructor
 
								Irfan Shakeel
Irfan Shakeel, the founder of the ehacking project, also hosts classes at EH Academy. He has found many vulnerabilities in the world’s known platforms, he has been providing IT security training since 2010. You might have read his articles and opinion on IBM Developers, Infosec Institute, AlienVault, EH Academy and other known blogs. Follow him on Twitter, LinkedIn and Quora.
Reviews
 
              	 
              	 
              	 
              	 
              	 
              	 
              	 
              	Your Instructor
 
        Irfan Shakeel, the founder of the ehacking project, also hosts classes at EH Academy. He has found many vulnerabilities in the world’s known platforms, he has been providing IT security training since 2010. You might have read his articles and opinion on IBM Developers, Infosec Institute, AlienVault, EH Academy and other known blogs. Follow him on Twitter, LinkedIn and Quora.
Course Curriculum
- 
        
          
          
            PreviewUnderstand the OWASP Top 10 (9:45)
- 
        
          
          
            StartSetup the Web application pentesting lab (10:21)
- 
        
          
          
            StartSensitive Data exposure and Directory listing (17:36)
- 
        
          
          
            StartAccess Control & Authentication using Burpsuite (18:54)
- 
        
          
          
            StartMastering the SQL-Injection (38:08)
- 
        
          
          
            StartFind & Exploit Cross-site-scripting (XSS) (23:01)
- 
        
          
          
            StartCommand Injection & LFI (22:45)
 
						 
            
            
           
									 
									 
								 
									 
								 
									 
								


