Web Application Pen Testing with Python
Offered By: Pluralsight
Course Description
Overview
When using tooling and scripting efficiently, one can improve the results of web application pentests. This course will teach you how to automate several web application steps using Python.
Most web application pentests follow a similar pattern, using the same tools each time. In this course, Web Application Pen Testing with Python, you’ll learn to utilize Python in order to become a better pentester. First, you’ll explore how to choose the right library and the right tool for the job. Next, you’ll discover how to glue web application pentesting tools together. Finally, you’ll learn how to develop an extension for the famous Burp Suite intercepting proxy. When you’re finished with this course, you’ll have the skills and knowledge of automation and Python needed to enhance your web application pentesting coverage and increase your pentesting skills.
Most web application pentests follow a similar pattern, using the same tools each time. In this course, Web Application Pen Testing with Python, you’ll learn to utilize Python in order to become a better pentester. First, you’ll explore how to choose the right library and the right tool for the job. Next, you’ll discover how to glue web application pentesting tools together. Finally, you’ll learn how to develop an extension for the famous Burp Suite intercepting proxy. When you’re finished with this course, you’ll have the skills and knowledge of automation and Python needed to enhance your web application pentesting coverage and increase your pentesting skills.
Syllabus
- Course Overview 1min
- Basic Reconnaissance Using Python Scripts 31mins
- Web Libraries and Web Scraping 20mins
- Automatic Web Reconnaissance Using Python Scripts 15mins
- Create a Python Script to Brute Force Web Authentication 17mins
- Develop Python Extensions in Burp Suite 20mins
Taught by
Peter Mosmans
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent