Главная
Study mode:
on
1
About the course
2
Installing Kali linux
3
Recon & Tools
4
URL Testing
5
Using OWASP Juice Shop
6
IDOR & Logic Errors
7
SQL Injection
8
Directory Traversals
9
XML Injection XXE
10
.61 XSS
11
Python Crash Course
12
SSRF
13
Command Injection
14
FIle Upload
15
8 LFI RFI
16
Insecure Deserialization
17
JWT Tokens
18
Attacking WordPress
19
Python Tool Building
Description:
This course will teach you how to use Kali Linux to learn recon and tools, test URLs, use the OWASP Juice Shop, detect IDORs and logic errors, explore SQL injection, understand directory traversal, learn XML injection, practice XSS, learn a Python Crash Course, investigate SSRF, use command injection, explore file upload, investigate LFI and RFI, delve into insecure deserialization, study JWT tokens, attack WordPress, and build your own Python tools.

Complete Bug Bounty Ethical Hacking Web Application Hacking Course

Add to list