2015
3 hours
Before we begin – the practical use of the training you are going to see has been proven by vast group of people – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, black- and white hat hackers. Please, read carefully what we’d like to share with you.
Section 1: Introduction
Table of Contents – 9 pages
Legal information – 6 pages
Section 2: Download your training code and examples
Your ZIP package with source codes and examples – Text
Section 3: Environment setup and training system configuration
Module 01. Introduction and environment configuration – 14 pages
Module 01. Introduction and environment configuration – Video Training
Section 4: Basic techniques
Module 02. Deep data hiding – 6 pages
Module 02. Deep data hiding – Video Training
Module 03. Brute-force and dictionary attacks – 15 pages
Module 03. Brute-force and dictionary attacks – Video Training
Module 04. Account lockout attack – 8 pages
Module 04. Account lockout attack – Video Training
Section 5: Lets get deeper – data leaks
Module 05. Web parameter tampering – 9 pages
Module 05. Web parameter tampering – Video Training
Module 06. Path and information disclosure – 10 pages
Module 06. Path and information disclosure – Video Training
Module 07. Forced browsing – 5 pages
Module 07. Forced browsing – Video Training
Module 08. Path traversal – 9 pages
Module 08. Path traversal – Video Training
Module 09. Unicode encoding – 3 pages
Module 10. Parameter delimiter – 9 pages
Module 10. Parameter delimiter – Video Training
Section 6: Incjection attacks
Module 11. PHP injection – 10 pages
Module 11. PHP injection – Video Training
Module 12. Direct static code injection – 9 pages
Module 12. Direct static code injection – Video Training
Module 13. SQL injection – 24 pages
Module 13. SQL injection – Video Training
Section 7: XSS related attacks
Module 14. XSS – Cross Site Scripting attack – 14 pages
Module 14. XSS – Cross Site Scripting attack – Video Training
Module 14B. XST – Cross Site Tracing attack – 11 pages
Module 14B. XST – Cross Site Tracing attack – Video Training
Module 15. XSRF – Cross Site Request Forgery attack – 14 pages
Module 15. XSRF – Cross Site Request Forgery attack – Video Training
Section 8: More advanced techniques
Module 16. Spying on data with a browser – 14 pages
Module 16. Spying on data with a browser – Video Training
Module 17. Session hijacking – 7 pages
Module 17. Session hijacking – Video Training
Module 18. Session fixation – 9 pages
Module 18. Session fixation – Video Training
Section 9: Phishing
Module 19. Phishing – 27 pages
Module 19. Phishing – Video Training
Section 10: Security testing in practice
Module 20. Automated security testing – 14 pages
Module 20. Automated security testing – Video Training
Section 11: Summary
Summary and references