• Home
  • Technology

By Dawid Czagan, Top 10 Hacker at HackerOne

Web Hacker’s Toolbox: Tools Used by Successful Hackers

Language: English
All Levels

What you will learn

  • Discover the tools used by successful hackers
  • Learn step by step how to use these tools in practice (DEMOS)
  • Find SQL injections in minutes with Sqlmap
  • Detect security weaknesses with Google Hacking
  • Do fuzzing with Burp Suite Intruder
  • Exploit race conditions with OWASP ZAP
  • Use these tools in your own penetration testing projects
  • Learn from one of the top hackers at HackerOne

Course description

Ethical hackers and penetration testers need a very good toolbox to do their job efficiently. What’s more, they need to learn step by step how to use the tools from this toolbox and that’s exactly what I’ll present in this online training. 

This self-paced online training is composed of 4 different courses:

1. How Hackers Find SQL Injections in Minutes with Sqlmap 2. Web Application Security Testing with Google Hacking 3. Fuzzing with Burp Suite Intruder 4. Exploiting Race Conditions with OWASP ZAP In the 1st course, I’ll demonstrate Sqlmap which is the most powerful tool for automated SQL injection detection and exploitation. In the 2nd course, I’ll present Google Hacking and I’ll show you how Google Hacking can be used to find security weaknesses in web applications. In the 3rd course, I’ll present fuzzing, which is a vulnerability detection technique used by many successful hackers, and I’ll demonstrate how to do fuzzing with Burp Suite Intruder. Finally, I’ll show you how to exploit race conditions with OWASP ZAP. Race conditions can lead to very dangerous attacks on modern web applications and this is exactly what I’ll demonstrate in course No. 4. This online training is about the tools used by successful hackers. That’s why I’ll present a lot of demos and I’ll show you step by step how to use these tools in practice. You’ll learn how to use these tools in your own penetration testing projects and you’ll also learn how to use them to protect your web applications.

Who this course is for:

* Penetration testers * Ethical hackers * Bug hunters * Security engineers / consultants

Requirements

  • Basic hacking skills

Course overview - 33

  • Course #1: How Hackers Find SQL Injections in Minutes with Sqlmap

  • The Basics of Sqlmap – Overview

  • The Basics of Sqlmap – Demo

  • Dumping Database Table Entries – Overview

  • Dumping Database Table Entries – Demo

  • From SQL Injection to Remote Code Execution – Overview

  • From SQL Injection to Remote Code Execution – Demo

  • More Advanced Testing with Sqlmap – Overview

  • More Advanced Testing with Sqlmap – Demo

  • Bypassing Web Application Firewalls – Overview

  • Bypassing Web Application Firewalls – Demo

  • Summary: Sqlmap

  • Course #2: Web Application Security Testing with Google Hacking

  • Google Hacking: Finding Directory Listings

  • Google Hacking: Finding SQL Syntax Errors

  • Google Hacking: Finding Publicly Exposed Backup Files

  • Google Hacking: Finding Internal Server Errors

  • Google Hacking: Finding Sensitive Data in URLs

  • Google Hacking: Finding Insecure HTTP Web Pages

  • Google Hacking Database

  • Case Study: Microsoft Yammer Social Network

  • How to Prevent Google Indexing from Happening

  • Summary: Google Hacking

  • Course #3: Fuzzing with Burp Suite Intruder

  • Fuzzing with Burp Suite Intruder – Overview

  • Fuzzing for SQL Injection – Demo

  • Fuzzing for Path Traversal – Demo

  • Fuzzing with Burp Suite Intruder – Tips and Tricks

  • Course #4: Exploiting Race Conditions with OWASP ZAP

  • Exploiting Race Conditions – Case 1 (Part1)

  • Exploiting Race Conditions – Case 1 (Part2)

  • Exploiting Race Conditions – Case 2

  • Case Studies of Award-Winning Race Condition Attacks

Learners who have already enrolled in this course

Meet your instructor

Dawid Czagan
Dawid CzaganTop 10 Hacker at HackerOne
Dawid Czagan is listed among Top 10 Hackers (HackerOne). He has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter and other companies. Due to the severity of many bugs, he received numerous awards for his findings. Dawid Czagan shares his security bug hunting experience in his hands-on trainings “Hacking Web Applications – Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More” and “Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation”. He delivered security training courses at key industry conferences such as Hack In The Box (Amsterdam), CanSecWest (Vancouver), 44CON (London), Hack In Paris (Paris), DeepSec (Vienna), HITB GSEC (Singapore), BruCON (Ghent) and for many corporate clients. His students include security specialists from Oracle, Adobe, ESET, ING, Red Hat, Trend Micro, Philips and government sector. Dawid Czagan is a founder and CEO at Silesia Security Lab – a company which delivers specialized security testing and training services.