Web Application Security Table of Content 1 Introduction to Cyber Security What is Cyber Security? Need of Cyber Security Common Terminologies Career and Growth Hacking as a Career Domains of Cyber Security Job Oppounities Threats to the Cyber World Non-IT Threats IT Threats Hacking Phases Reconnaissence Scanning Gaining Access Maintaining Access Clearing Tracks Search Engines 2 Hrs 2 Introduction Need of Footprinting Footprinting 3 Hrs Targets of Footprinting IT Infrastructure Organizational Infrastructure Footprinting Techniques Footprinting using search engine Footprinting using Google Footprinting using Shodan Footprinting Using WHOIS Footprinting Using DNS Queries Footprinting through Social Engineering Footprinting through command-line utilities Footprinting using Tools Footprinting using Source Code Examination Footprinting individuals Google.com shodan.io whois.com 3 Network Scanning Introduction Types of scanning Objectives of scanning techniques Scanning for Live Single Systems Scanning for Live Multiple Systems Scanning for Open Pos ping Zenmap/Nmap TCP Connect / Open Scan,Half Open Scan, Strobe Scan ,FIN | Null | Xmas Tree Scan, FTP Bounce Scan ,UDP Scan Po Scanning Techniques Zenmap/Nmap Zenmap/Nmap Zenmap/Nmap 6 Hrs
3
Embed
Web Application Security Course TOC€¦ · Injection Aacks Web Script Injection SMTP Injection SQL Injection LDAP Injection XPath Injection Command Injection Aack Web Application
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Web Application SecurityTa
ble
of
Co
nte
nt
1Introduction to Cyber Security
What is Cyber Security?
Need of Cyber Security
Common Terminologies
Career and GrowthHacking as a Career
Domains of Cyber Security
Job Oppo�unities
Threats to the Cyber WorldNon-IT Threats
IT Threats
Hacking PhasesReconnaissence
Scanning
Gaining Access
Maintaining Access
Clearing Tracks
Search Engines
2Hrs
2Introduction
Need of Footprinting
Footprinting3Hrs
Targets of FootprintingIT Infrastructure
Organizational Infrastructure
Footprinting TechniquesFootprinting using search engine
Footprinting using Google
Footprinting using Shodan
Footprinting Using WHOIS
Footprinting Using DNS Queries
Footprinting through Social Engineering
Footprinting through command-line utilities
Footprinting using Tools
Footprinting using Source Code Examination
Footprinting individuals
Google.com
shodan.io
whois.com
3Network Scanning
Introduction
Types of scanning
Objectives of scanning techniquesScanning for Live Single Systems
Scanning for Live Multiple Systems
Scanning for Open Po�s
ping
Zenmap/Nmap
TCP Connect / Open Scan,Half Open Scan,
Strobe Scan ,FIN | Null | Xmas Tree Scan,
FTP Bounce Scan ,UDP Scan
Po� Scanning TechniquesZenmap/Nmap
Zenmap/Nmap
Zenmap/Nmap
6Hrs
Hping, NetScan Tool,
Strobe (Super optimised TCP po� surveyor)
Scanning for System Information
Po� Scanner Tools
Vulnerability Scanner Tools
Vulnerability Scanning Nessus, OpenVas
Tools for mapping Network Architecture
Determining Network Architecture, Nessus
LanState Pro, Network Mapper
Conclusion
4Web Application Hacking
Basics of Web ApplicationArchitecture of Web Applications