Ethical hackers and penetration testers need an efficient toolbox and a step-by-step guide to use these tools effectively. This course covers:
Web Hacker's Toolbox - Tools Used by Successful Hackers
Instructor: Packt - Course Instructors
Sponsored by Louisiana Workforce Commission
Recommended experience
What you'll learn
Apply Sqlmap to find SQL injections within minutes
Analyze web applications to detect security weaknesses using Google Hacking
Execute fuzzing techniques with Burp Suite Intruder to uncover vulnerabilities
Demonstrate the exploitation of race conditions using OWASP ZAP
Details to know
Add to your LinkedIn profile
3 assignments
September 2024
See how employees at top companies are mastering in-demand skills
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
In this module, we will provide a comprehensive overview of the course. You'll gain insights into what topics will be covered, how the course is structured, and the expected outcomes. This foundational knowledge will set the stage for your learning journey.
What's included
1 video
In this module, we will delve into the powerful tool, Sqlmap, used by hackers to find SQL injections quickly. You will learn the basics of Sqlmap through both theoretical overviews and practical demos, explore how to dump database entries, and understand the transition from SQL injection to remote code execution. Additionally, advanced testing techniques and methods to bypass web application firewalls will be covered.
What's included
12 videos
In this module, we will explore Google Hacking, a method used to find security vulnerabilities in web applications through advanced search techniques. You will learn how to uncover directory listings, SQL syntax errors, exposed backup files, internal server errors, and sensitive data in URLs. Case studies and practical examples will illustrate these concepts, along with strategies to prevent Google indexing.
What's included
11 videos1 assignment
In this module, we will cover the essentials of fuzzing and how to use Burp Suite Intruder for security testing. You will gain hands-on experience through demos on fuzzing for SQL injection and path traversal. Additionally, practical tips and advanced tricks will be shared to enhance your fuzzing techniques.
What's included
5 videos
In this module, we will explore the exploitation of race conditions using OWASP ZAP. Through detailed case studies, you will learn how attackers leverage multithreading conditions and reuse discount codes to steal money. The module includes in-depth discussions of award-winning race condition attacks, providing valuable insights into both offensive and defensive strategies.
What's included
5 videos2 assignments
Instructor
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Information Technology
EC-Council
LearnKartS
Johns Hopkins University
Johns Hopkins University
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy