Book Image

Hands-On Web Penetration Testing with Kali Linux [Video]

By : Rassoul Ghaznavi Zadeh
Book Image

Hands-On Web Penetration Testing with Kali Linux [Video]

By: Rassoul Ghaznavi Zadeh

Overview of this book

<p>Kali Linux contains a large number of penetration testing tools from various different niches in the security and forensics fields. Kali Linux offers a multitude of options to scan a single IP, port, or host (or a range of IPs, ports, and hosts) and discover vulnerabilities and security holes. The output and the information this provides can serve as a precursor to penetration testing efforts.</p> <p>Have you ever wondered how to test web applications security? This course will teach you about web application vulnerabilities and how to use Kali Linux tools to perform web penetration testing to professional standards. You will start with application security and learn about the process of web penetration testing. Then you'll create a test lab with Oracle VirtualBox and Kali Linux. Next, you'll learn about common vulnerabilities in web applications with practical examples, which will help you understand the process of penetration testing and the importance of security. Now you'll be introduced to different tools to assess and analyze web application vulnerabilities. In the end, you'll learn to secure web applications.</p> <p>By the end of the course, you'll be able to perform web penetration testing using Kali Linux.</p> <p>The code bundle for this course is available at https://github.com/PacktPublishing/Hands-on-Web-Penetration-Testing-with-Kali-Linux.</p> <h1>Style and Approach</h1> <p>The course starts with application security and explores the OWASP top 10 identified application vulnerabilities. Then you will create a test lab with Kali Linux and delve into common web application vulnerabilities. Next, you’ll be introduced to Kali Linux tools and techniques that can be used to assess and analyze web application vulnerabilities. Finally, you’ll learn to secure web applications.</p>
Table of Contents (5 chapters)
Chapter 1
Application Security
Content Locked
Section 2
Web Application and Security
In this video, we will discuss the concerns with web applications. - Look at the web application specifications - Understand the risks associated with web applications - Understand the penetration testing process