Web Application Penetration Testing: Information Gathering
This course will teach you about web application information gathering which you can use to craft your defenses, since a web application is only as strong as its weakest link.
How can you prevent attacks if you don’t know your enemy? In this course, Web Application Penetration Testing: Information Gathering, you’ll learn to better know how your enemies target you. First, you’ll explore fingerprinting web applications and their building blocks. Next, you’ll discover enumerating those applications and knowing their entry points. Finally, you’ll learn how to use all the needed tools. When you’re finished with this course, you’ll have the skills and knowledge needed to understand how information can be gathered about web targets.
Author Name: Malek Mohammad
Author Description:
Malek Mohammad is an Information Security Consultant and Penetration Tester with previous software development experience. Malek works on making payment applications more secure through Penetration Testing and Threat Modeling. In addition, He helped many software developers in designing their application with security in mind, and not as an afterthought. Malek still has enthusiasm for software development, he uses Python to automate attack scenarios.
Table of Contents
- Course Overview
1min - Using Fingerprinting to Identify Targets
24mins - Enumerating Hidden Web Apps and Search for Info Leakage
18mins - Identifying Web Application Entry Points and Execution Paths
9mins - Unearthing Web Application Architecture
6mins
There are no reviews yet.