Getting started with Web Application Hacking

What you will learn

Have a environment to learn web application hacking

Learn how to use Burp proxy tool

Identify few basic security vulnerabilities

Identify bugs within web applications

English
language

Content


Get Instant Notification of New Courses on our Telegram channel.


Introduction

Course Introduction
Why Proxy is used?

Setting up Burp Proxy

Download Java
Download and install Burp Proxy

Setting up Web Attacks and Exploitation Distro (WAED)

Intro to WAED
WAED download
Installing WAED
Start/Stop Applications in WAED
Clean up Applications in WAED
Setting up Burp Proxy in WAED
Accessing Applications from Windows Machine

Introduction to Burp Proxy

Burp Introduction
Burp – Proxy tab demo
Burp – Repeater tab demo
Burp – Intruder tab demo
Burp – Comparer tab demo
Burp – Decoder tab demo
Burp – Spider tab demo
Burp – Scanner tab demo
Burp – Target tab demo
Burp – Option tab demo
Burp – Extender tab demo
Start Burp from Command line

Conclusion

Outro