Introduction and Setup
  • About Myself
  • What is Burp. Course Expectations
  • Download Resources and Setup Environment
  • Join Our Online Classroom!
  • Resources Download
  • Alternative setup - Download Burp. Free vs Paid
Burp Modules and Usage
  • Environment Setup. Import Burp Certificate
  • General concept
  • Target Module
  • Proxy Module - Part 1
  • Proxy Module - Part 2
  • Spider Module
  • Repeater Module
  • Sequencer and Scanner Modules
  • Decoder Module
  • Intruder and Comparer Modules
  • BApp Store
Final words
  • Burp Proxy Help - Further Documentation
  • Burp Alternatives
  • Final words
(Bonus) Web Penetration testing
  • Core Problems - Why Web Security
  • Information Gathering using Search Engines and Social Networks - part 1
  • Information Gathering using Search Engines and Social Networks - part 2
  • Brute-frocing Web Resources using Dirb and Dirbuster
  • Session Hijacking trough Man In The Middle Attack
  • Intercept and access traffic over HTTPS. Get Facebook or Gmail Passwords
  • Further information
(Bonus) Network Penetration testing
  • Bonus - OWASP Top 10 Vulnerabilities
  • Demo - Use Nessus to Discover Vulnerabilities
  • Metasploit Introduction
  • Sniffing
  • Demo - Exploiting FTP Server Vulnerability using Metasploit
  • Demo - Windows backdoor using Metasploit
  • Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the Victim PC