Web Application Penetration Testing: Information Gathering
This course will teach you about web application information gathering which you can use to craft your defenses, since a web application is only as strong as its weakest link.
What you'll learn
How can you prevent attacks if you don't know your enemy? In this course, Web Application Penetration Testing: Information Gathering, you’ll learn to better know how your enemies target you. First, you’ll explore fingerprinting web applications and their building blocks. Next, you’ll discover enumerating those applications and knowing their entry points. Finally, you’ll learn how to use all the needed tools. When you’re finished with this course, you’ll have the skills and knowledge needed to understand how information can be gathered about web targets.
Table of contents
In this course, information gathering means to gather all types of information you can about a specific target in order to better understand the targets strengths and weaknesses.
Application security software is used to develop, test, and optimize security measures with applications to prevent and mitigate security vulerabilities from attackers.
The prerequisite for this course is to have an understanding of Linux Command Line.
In this course, you will learn how to identify targets through fingerprinting, discover hidden web applications, how to find leakages, how to enumerate web entry points, and how to map the application architecture. By the end of this course you will know how to do full reconnaissance for your target.
Linux command line is a text interface to your computer that allows users to execute commands by manually typing within the terminal.