1 00:00:01,140 --> 00:00:02,420 Hello and welcome. 2 00:00:02,490 --> 00:00:08,220 My name is a I'm an ethical hacker a computer scientist and I'll be an instructor in this course and 3 00:00:08,220 --> 00:00:09,740 this goes I'm going to teach you. 4 00:00:09,740 --> 00:00:12,190 Website hacking and penetration testing. 5 00:00:12,210 --> 00:00:13,860 So we're going to start from scratch. 6 00:00:13,860 --> 00:00:19,020 And by the end of the Course you'll be at a high intermediate level been able to launch attacks exactly 7 00:00:19,200 --> 00:00:21,990 the same way that black hat hackers would do. 8 00:00:22,020 --> 00:00:27,590 Not only that but you also learn how to secure web applications and prevent these attacks from happening. 9 00:00:28,360 --> 00:00:33,490 So this curse is going to start from scratch we're going to start with the basics on how to set up your 10 00:00:33,490 --> 00:00:37,630 lab how to set up your computer for penetration testing. 11 00:00:38,020 --> 00:00:38,740 What's on with that. 12 00:00:38,740 --> 00:00:42,810 We're going to start talking about web sites before we talk about Harken. 13 00:00:42,850 --> 00:00:47,800 We're going to talk about how web sites work how their requests are sent and received so that we can 14 00:00:47,800 --> 00:00:53,320 exploit this and launch our attacks once we understand how web sites work we're going to move into our 15 00:00:53,320 --> 00:00:58,320 first section of penetration testing which is going to be information gathering and the section you're 16 00:00:58,330 --> 00:01:04,120 going to learn how to gather very important information about your target such as the technologies used 17 00:01:04,330 --> 00:01:08,070 the DNS servers used and the other web sites on the same server. 18 00:01:08,080 --> 00:01:12,140 And we'll talk about why this is important and why you need to know this. 19 00:01:12,400 --> 00:01:17,410 Once you understand how web sites work we're going to move into our main penetration test in sections 20 00:01:17,410 --> 00:01:24,170 where you're going to learn how to discover exploit and protect from a large number of vulnerabilities. 21 00:01:24,190 --> 00:01:27,910 So the cost is going to be highly practical without neglecting your part. 22 00:01:27,910 --> 00:01:33,010 We're going to first talk about why these vulnerabilities happen how to discover them how to exploit 23 00:01:33,010 --> 00:01:37,140 them and gain full control over the service over over the Web site. 24 00:01:37,240 --> 00:01:41,950 At the end we're going to see how you can secure web sites from these attacks and prevent them from 25 00:01:41,950 --> 00:01:42,310 happening. 26 00:01:42,310 --> 00:01:47,760 So if you're a programmer you'll know what to avoid so that these abilities won't happen. 27 00:01:47,830 --> 00:01:52,450 Done with the section we're going to move into our post exploitation where you're going to learn what 28 00:01:52,450 --> 00:01:55,630 can we do with the access that you gained in the previous section. 29 00:01:55,800 --> 00:02:01,660 So we're going to learn how to upload download files navigate within the target web server navigate 30 00:02:01,660 --> 00:02:06,100 from web site to another and even access the database of the target server. 31 00:02:07,160 --> 00:02:09,550 This is just an overview of the messages. 32 00:02:09,650 --> 00:02:12,230 The course will contain even more cooler stuff.