Information Technology | Softwares - Graphics - Programming - Hacking - Security

Mar 17, 2018

Learn information assurance - Security and Hacking ebook - Labs English


Because cybersecurity ties directly to the discipline of computer science and information technology, individuals will typically need a strong technology background or interest in information systems to pursue a cybersecurity profession. Experience with computer science; information technology; research and development; the completion of security certifications; and consulting activities can all help build a career in cybersecurity.




Although this ebook is not the latest but any security expert also has learned this knowledges. 


This eBook includes 30 sections:

  • Installation of Kali Linux management system
  • Install DVWA on WINDOWS
  • Command Execution Basic Testing
  • Using Metasploit with Command Execution
  • Using Tamper Data with crack web form
  • XPATH Injection 
  • Formula Injection
  • PHP Object Injection
  • Unrestricted File Upload
  • Manual SQL Injection
  • Automate SQL Injection with SqlMap
  • XVWA Technical run
  • Blind SQL Injection
  • Upload PHP Backdoor Payload
  • Reflected Cross Site Scripting
  • Stored Cross Site Scripting
  • DOM Based Cross Site Scripting
  • Cross Site Request Forgery combined with Curl
  • Cross Site Request Forgery (CSRF)
  • Server Side Request Forgery (SSRF)
  • File Inclusion
  • Insecure Direct Object Reference
  • Burp Suite with Man in the middle attack
  • Burp Suite with Spider Function
  • Using nikto
  • Upload and use C99.php Backdoor shell
  • Union exploit, create_user.php
  • Unvalidated Redirects and Forwards
  • Server-Side Template Injection: RCE for the modern webapp
Share:

About Us