Introduction
  • Introduction
  • Introduction to Web Security
  • What is website & How it work ?
Understanding Important Terms
  • Stages of Web Testing
  • Bug Bounty vs Penetration Testing
  • Understanding scope, ethics, code of conduct
Setting Up Our Lab
  • Setting Up Attacker Box
  • Exploring Vulnerable Environment
Understanding Web Application Technologies
  • HTTP Cookies
  • Same Origin Policy
  • Cross Origin Resource Sharing Policy
Information Gathering
  • Finding DNS Information
  • Finding Web Technologies
  • Sub Domain Enumeration
  • Directory Enumeration
  • Setting Up Burp Suite
SQL Injection
  • Lab 1
  • Lab 2
  • Lab 3
  • Lab 4
  • Account Takeover Using SQL Injection
Authentication Vulnerabilities
  • Account Takeover Using Authentication Vulnerabilities
Cross Site Scription
  • Lab 1
  • Lab 2
  • Lab 3
  • Lab 4
  • Lab 5
Directory Traversal
  • Lab 1
  • Lab 2
  • Lab 3
  • Lab 4
OS Command Injection
  • Lab 1
  • Lab 2
  • Lab 3
  • Lab 4
Wrapping Up
  • Course Conclusion & Free Resources