Introduction to Web Hacking (Arabic)

ستطبق بشكل عملي علي اشهر الثغرات التي تصيب المواقع



Platform: Udemy
Status: Available
Duration: 2 Hours

Price: $24.99 $0.00


Note: Udemy FREE coupon codes are valid for maximum 3 days only. Look for "Get Coupon" orange button at the end of Description. This post may have affiliate link & we may get small commission if you make a purchase.

Notice for Our Visitors in INDIA:
If Udemy Coupon is 100% OFF but it is not FREE when you go to Udemy Website, please follow the below instructions to make it work. This is mainly affecting visitors that has INDIA as a Country of Residence in their profile in Udemy.

Steps:
1. Use VPN (Virtual Private Network) & Select Another Country like USA.
2. Clear udemy.com website cookies from your browser or You can also use incognito mode or different browser like Opera which has inbuilt VPN.
3. After making a VPN Connection, Create a new Udemy Account.
4. Then go to your desired Course Page & Apply Coupon.
5. If the Coupon is successfully applied, then Continue the process & Enter the VPN Country.
6. Enjoy your Free Course!

What you'll learn

  • Introduction to Web Hacking
  • How Server Work
  • Command Execution Vulnerability
  • File Inclusion Vulnerability
  • File Upload Vulnerability
  • SQL Injection Vulnerability
Requirements
  • Labtop or Computer
Description
In this course you will learn about the most common web application vulnerabilities, understanding what makes it vulnerable and putting theory into practice by hacking website simulations. You will also be taught how to identify, exploit and prevent each vulnerability.

-Command Execution Vulnerability:Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application. Command injection attacks are possible largely due to insufficient input validation.

-File Inclusion Vulnerability:allows an attacker to include a file, usually exploiting a “dynamic file inclusion” mechanisms implemented in the target application. The vulnerability occurs due to the use of user-supplied input without proper validation.

-File Upload Vulnerability:Uploaded files represent a significant risk to applications. The first step in many attacks is to get some code to the system to be attacked. Then the attack only needs to find a way to get the code executed. Using a file upload helps the attacker accomplish the first step.

The consequences of unrestricted file upload can vary, including complete system takeover, an overloaded file system or database, forwarding attacks to back-end systems, client-side attacks, or simple defacement. It depends on what the application does with the uploaded file and especially where it is stored.

There are really two classes of problems here. The first is with the file metadata, like the path and file name. These are generally provided by the transport, such as HTTP multi-part encoding. This data may trick the application into overwriting a critical file or storing the file in a bad location. You must validate the metadata extremely carefully before using it.

The other class of problem is with the file size or content. The range of problems here depends entirely on what the file is used for. See the examples below for some ideas about how files might be misused. To protect against this type of attack, you should analyse everything your application does with files and think carefully about what processing and interpreters are involved.

SQL Injection Vulnerability:

SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.

SQL Injection is very common with PHP and ASP applications due to the prevalence of older functional interfaces. Due to the nature of programmatic interfaces available, J2EE and ASP.NET applications are less likely to have easily exploited SQL injections.

The severity of SQL Injection attacks is limited by the attacker’s skill and imagination, and to a lesser extent, defense in depth countermeasures, such as low privilege connections to the database server and so on. In general, consider SQL Injection a high impact severity.

Who this course is for:

  • Beginners who are Curious to Learn Web Hacking