Главная
Study mode:
on
1
- Introductions/Welcomes
2
- whoami
3
- Course learning objectives
4
- Important TCM resources
5
- Web app resources
6
- Five stages of ethical hacking
7
- Reconnaissance overview
8
- Identifying target to enumerate
9
- Using sublist3r to identify subdomains
10
- Using crt.sh to identify subdomains
11
- Setting up proxy for Burp Suite
12
- Enumerating with Burp Suite
13
- Credential stuffing/password spraying theory/tools
14
- Using Nikto as a vulnerability scanner
15
- Enumerating cipher strength
16
- Using nmap for fingerprinting
17
- Actively scanning with Burp Suite Pro
18
- Reviewing Juice Shop
19
- AMA begins
Description:
Dive into the first episode of a comprehensive web application testing series, focusing on enumeration techniques. Learn about the five stages of ethical hacking, reconnaissance methods, and tools for identifying subdomains. Explore the use of Burp Suite for enumeration, understand credential stuffing and password spraying concepts, and discover vulnerability scanning with Nikto. Gain insights on fingerprinting with nmap, active scanning with Burp Suite Pro, and review the Juice Shop application. Access valuable resources for web application security testing and participate in an Ask Me Anything session to enhance your knowledge in this critical cybersecurity domain.

Web App Testing - Enumeration

Cyber Mentor
Add to list
0:00 / 0:00