Getting started with Web Application Hacking
What you will learn
Have a environment to learn web application hacking
Learn how to use Burp proxy tool
Identify few basic security vulnerabilities
Identify bugs within web applications
English
language
Content
Introduction
Course Introduction
Why Proxy is used?
Setting up Burp Proxy
Download Java
Download and install Burp Proxy
Setting up Web Attacks and Exploitation Distro (WAED)
Intro to WAED
WAED download
Installing WAED
Start/Stop Applications in WAED
Clean up Applications in WAED
Setting up Burp Proxy in WAED
Accessing Applications from Windows Machine
Introduction to Burp Proxy
Burp Introduction
Burp – Proxy tab demo
Burp – Repeater tab demo
Burp – Intruder tab demo
Burp – Comparer tab demo
Burp – Decoder tab demo
Burp – Spider tab demo
Burp – Scanner tab demo
Burp – Target tab demo
Burp – Option tab demo
Burp – Extender tab demo
Start Burp from Command line
Conclusion
Outro