Introduction
  • Introduction
  • Virtual Platforms
  • Enabling Virtualization (VT-x or AMD-V) in BIOS
  • Lab's Architecture Diagram
  • Using VirtualBox vs VMware
  • Install & Run Oracle VM VirtualBox
  • Installing Kali using the VMware Image - Step 1
  • Installing Kali using the VMware Image - Step 2
  • Installing Kali using the VMware Image - Step 3
  • Installing Kali using the ISO file for VMware - Step 1
  • Installing Kali using the ISO file for VMware - Step 2
  • Installing Kali using the ISO file for VMware - Step 3
  • Installing Kali on VirtualBox using the OVA file - Step 1
  • Installing Kali on VirtualBox using the OVA file - Step 2
  • Installing Kali on VirtualBox using the OVA file - Step 3
  • Installing Kali using the ISO file for VirtualBox - Step 1
  • Installing Kali using the ISO file for VirtualBox - Step 2
  • Installing Kali using the ISO file for VirtualBox - Step 3
  • Download & Install OWASPBWA
  • Accessing OWASP BWA
  • Configuring NAT Network in Oracle VM VirtualBox
  • Test VMs If They see Each Other
Technologies & Standards
  • Basic Terms & Standards
  • HTTP Protocol Basics and SSL
  • Intercepting HTTP Traffic with Burp Suite
  • Intercepting HTTPS Traffic with Burp Suite
  • Web Attacks Classification
An Automated Tool: OWASP ZAP (Zed Attack Proxy)
  • Introduction to OWASP ZAP
  • Installation of OWASP ZAP & a Quick Scan
  • Using OWASP ZAP as a Personal Proxy
  • Intercepting HTTPS Traffics with OWASP ZAP
  • Scanning a Website Which Requires Authentication
Information Gathering & Configuration Management
  • Information Gathering & Configuration Management Part 1
  • Information Gathering & Configuration Management Part 2
Input - Output Manipulation
  • SOP, Javascript and Input-Output Validation
  • XSS (Cross Site Scripting) - Reflected XSS
  • XSS (Cross Site Scripting) - Stored and DOM Based XSS
  • BeEF - The Browser Exploitation Framework
  • SQL Injection Part 1
  • SQL Injection Part 2
  • SQL Injection Part 3
Authentication and Authorization
  • Authentication
  • Authentication Attacks
  • An Online Dictionary Attack with Hydra
  • Authorization
  • Path Traversal Demo
Session Management and Cross Site Request Forgery
  • Session Management
  • Session Fixation & Demo
  • Cross Site Request Forgery
Information Gathering Through the Internet
  • Introduction
  • Using Search Engines & Google Hacking to Gather Information
  • Search Engine Tools: SiteDigger and SearchDiggity
  • Shodan
  • Gathering Information About the People
  • Web Archives
  • FOCA Fingerprinting Organisations with Collected Archives
  • The Harvester & Recon-NG
  • Maltego - Visual Link Analysis Tool
BONUS
  • BONUS