Scan Web Applications with Bash
Offered By: Pluralsight
Course Description
Overview
Enumerating web applications is the first step of a web application penetration testing. This course will teach you how to enumerate and find vulnerabilities in web applications using Bash.
During a web application pen test, your first step is to enumerate the target application to find vulnerabilities that could later be exploited. In this course, Scan Web Applications with Bash, you’ll learn how to write bash scripts to discover content in web applications as well as finding vulnerabilities in your target. First, you’ll explore how to find open services in your target. Next, you’ll discover how to enumerate files, folders, and parameters in web applications. Finally, you’ll learn how to find vulnerabilities in your web targets using Nikto and other tools. When you’re finished with this course, you’ll have the skills and knowledge of Bash needed to discover content and vulnerabilities in web applications.
During a web application pen test, your first step is to enumerate the target application to find vulnerabilities that could later be exploited. In this course, Scan Web Applications with Bash, you’ll learn how to write bash scripts to discover content in web applications as well as finding vulnerabilities in your target. First, you’ll explore how to find open services in your target. Next, you’ll discover how to enumerate files, folders, and parameters in web applications. Finally, you’ll learn how to find vulnerabilities in your web targets using Nikto and other tools. When you’re finished with this course, you’ll have the skills and knowledge of Bash needed to discover content and vulnerabilities in web applications.
Syllabus
- Course Overview 1min
- Discovering Open Ports and Services 12mins
- Web Application Enumeration 18mins
- Vulnerability Discovery 14mins
Taught by
Ricardo Reimao
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network