4.47 (18 reviews)
☑ Burp-Suite Tool
☑ Web Application Security Testing
☑ Burp-Suite Intruder
Welcome to - Hands-on with Burp-Suite | Web Application Security Testing
This course is developed to share real-world cybersecurity challenges and their solutions with a comprehensive approach from no-prior knowledge to advance level. With this course, you'll not just get the information about fundamentals, technologies, tools, process but also get to know real-world use cases.
There is never been a better than today to kickstart your career in Ethical Hacking, Penetration Testing and Cybersecurity. In order to developed an outcome-driven course module, we have used two approach: Bottom-up Approach and Project-based Approach.
Bottom-Up Approach: With this approach, we've broken down each complex topics and delivering into simplified way such as before getting started with Ethical Hacking we'll go through Linux and Networking fundamentals.
Project-Based Approach: With this approach, we've used real-world example and use cases to understand complex topics such as Understanding Vulnerabilities with real-world Mobile application, understanding web application threats using Linkedin Account hacking etc.
This section covers one of the very critical web application attack i.e. SQL Injection attack.
You'll learn fundamentals of SQL Injection attack.
You'll do hands-on in setting up MySQL database from scratch.
You'll lean how SQL Query works.
You'll learn to hack a web application using SQL Injection.
You'll learn about Burp-Suite.
You'll do hand-on with Burp-Suite to hacking target web application.
Introduction and Lab Set-up
Installing OWASP BWA
bWAPP Introduction and Quick Tour
OWASP Security Testing Practices
Getting Started with Burp-Suite
Burp-Suite Product Tour
What is Intruder?
Steps to perform SQL Injection using Intruder
SQL Injection attack using Intruder in Burp-Suite
Demo: Repeater Feature