Learning Python Web Penetration Testing

Course

Online

£ 12 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Make your applications attack-proof by penetration testing with Python.With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or web app in order to assess its vulnerabilities to external threats. While there are an increasing number of sophisticated ready-made tools to scan systems for vulnerabilities, the use of Python allows testers to write system-specific scripts, or alter and extend existing testing tools to find, exploit, and record as many security weaknesses as possible.This course will walk you through the web application penetration testing methodology, showing you how to write your own tools with Python for every main activity in the process. It will show you how to test for security vulnerabilities in web applications just like security professionals and hackers do.The course starts off by providing an overview of the web application penetration testing process and the tools used by professionals to perform these tests. Then we provide an introduction to HTTP and how to interact with web applications using Python and the Requests library. Then will follow the web application penetration testing methodology and cover each section with a supporting Python example. To finish off, we test these tools against a vulnerable web application created specifically for this course.Stop just running automated tools—write your own and modify existing ones to cover your needs! This course will give you a flying start as a security professional by giving you the necessary skills to write custom tools for different scenarios and modify existing Python tools to suit your application’s needs.About The Author

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Understand the web application penetration testing methodology and toolkit
Interact with web applications using Python and the Requests library
Write a web crawler/spider with the Scrapy library
Create an HTTP bruteforcer based on Requests
Create a Password bruteforcer for Basic, NTLM, and Forms authentication
Detect and exploit SQL injections vulnerabilities by creating a script all by yourself
Intercept and manipulate HTTP communication using Mitmproxy

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Install
  • Anatomy
  • Web
  • Protocol
  • Works
  • Server
  • Testing
  • Access

Course programme

Learning Python Web Penetration Testing 4 lectures 26:22 The Course Overview This video provides an overview of the entire course. Understanding Web Application Penetration Testing Process You will learn about the web app penetration-testing methodology, the toolset, and our lab environment.
  • Introduce web application penetration testing with the security of the application and methodology in performing such tests
  • Learn about the tools most commonly used by professional pentesters
  • Take a look at our lab environment
Typical Web Application Toolkit You will learn about the traditional tools used by security professionals to perform penetration tests. This will provide a basic understanding of the most important type of tools used, and give us ideas on what we can build with Python.
  • Introduce HTTP proxies, the most important tool of the set.
  • Learn about Web Crawlers/ Spiders, Scanners, and brute forcers.
  • Explore tools specifics for certain tasks or scenarios
Testing Environment We need to set up the testing environment and we would use VirtualBox, VM, text editor, and the vulnerable Web application we are going to use as target of our tests.
  • Install VirtualBox to run our Lab VM
  • Access the testing application
  • Finally we are going to see the text editor and an important warning
Learning Python Web Penetration Testing 4 lectures 26:22 The Course Overview This video provides an overview of the entire course. Understanding Web Application Penetration Testing Process You will learn about the web app penetration-testing methodology, the toolset, and our lab environment.
  • Introduce web application penetration testing with the security of the application and methodology in performing such tests
  • Learn about the tools most commonly used by professional pentesters
  • Take a look at our lab environment
Typical Web Application Toolkit You will learn about the traditional tools used by security professionals to perform penetration tests. This will provide a basic understanding of the most important type of tools used, and give us ideas on what we can build with Python.
  • Introduce HTTP proxies, the most important tool of the set.
  • Learn about Web Crawlers/ Spiders, Scanners, and brute forcers.
  • Explore tools specifics for certain tasks or scenarios
Testing Environment We need to set up the testing environment and we would use VirtualBox, VM, text editor, and the vulnerable Web application we are going to use as target of our tests.
  • Install VirtualBox to run our Lab VM
  • Access the testing application
  • Finally we are going to see the text editor and an important warning
The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. The Course Overview This video provides an overview of the entire course. This video provides an overview of the entire course. This video provides an overview of the entire course. Understanding Web Application Penetration Testing Process You will learn about the web app penetration-testing methodology, the toolset, and our lab environment.
  • Introduce web application penetration testing with the security of the application and methodology in performing such tests
  • Learn about the tools most commonly used by professional pentesters
  • Take a look at our lab environment
Understanding Web Application Penetration Testing Process You will learn about the web app penetration-testing methodology, the toolset, and our lab environment.
  • Introduce web application penetration testing with the security of the application and methodology in performing such tests
  • Learn about the tools most commonly used by professional pentesters
  • Take a look at our lab environment
Understanding Web Application Penetration Testing Process You will learn about the web app penetration-testing methodology, the toolset, and our lab environment.
  • Introduce web application penetration testing with the security of the application and methodology in performing such tests
  • Learn about the tools most commonly used by professional pentesters
  • Take a look at our lab environment
Understanding Web Application Penetration Testing Process You will learn about the web app penetration-testing methodology, the toolset, and our lab environment.
  • Introduce web application penetration testing with the security of the application and methodology in performing such tests
  • Learn about the tools most commonly used by professional pentesters
  • Take a look at our lab environment
You will learn about the web app penetration-testing methodology, the toolset, and our lab environment.
  • Introduce web application penetration testing with the security of the application and methodology in performing such tests
  • Learn about the tools most commonly used by professional pentesters
  • Take a look at our lab environment
You will learn about the web app penetration-testing methodology, the toolset, and our lab environment.
  • Introduce web application penetration testing with the security of the application and methodology in performing such tests
  • Learn about the tools most commonly used by professional pentesters
  • Take a look at our lab environment
Typical Web Application Toolkit You will learn about the traditional tools used by security professionals to perform penetration tests. This will provide a basic understanding of the most important type of tools used, and give us ideas on what we can build with Python.
  • Introduce HTTP proxies, the most important tool of the set.
  • Learn about Web Crawlers/ Spiders, Scanners, and brute forcers.
  • Explore tools specifics for certain tasks or scenarios
Typical Web Application Toolkit You will learn about the traditional tools used by security professionals to perform penetration tests. This will provide a basic understanding of the most important type of tools used, and give us ideas on what we can build with Python.
  • Introduce HTTP proxies, the most important tool of the set.
  • Learn about Web Crawlers/ Spiders, Scanners, and brute forcers.
  • Explore tools specifics for certain tasks or scenarios
Typical Web Application Toolkit You will learn about the traditional tools used by security professionals to perform penetration tests. This will provide a basic understanding of the most important type of tools used, and give us ideas on what we can build with Python.
  • Introduce HTTP proxies, the most important tool of the set.
  • Learn about Web Crawlers/ Spiders, Scanners, and brute forcers.
  • Explore tools specifics for certain tasks or scenarios
Typical Web Application Toolkit You will learn about the traditional tools used by security professionals to perform penetration tests. This will provide a basic understanding of the most important type of tools used, and give us ideas on what we can build with Python.
  • Introduce HTTP proxies, the most important tool of the set.
  • Learn about Web Crawlers/ Spiders, Scanners, and brute forcers.
  • Explore tools specifics for certain tasks or scenarios
You will learn about the traditional tools used by security professionals to perform penetration tests. This will provide a basic understanding of the most important type of tools used, and give us ideas on what we can build with Python.
  • Introduce HTTP proxies, the most important tool of the set.
  • Learn about Web Crawlers/ Spiders, Scanners, and brute forcers.
  • Explore tools specifics for certain tasks or scenarios
You will learn about the traditional tools used by security professionals to perform penetration tests. This will provide a basic understanding of the most important type of tools used, and give us ideas on what we can build with Python.
  • Introduce HTTP proxies, the most important tool of the set.
  • Learn about Web Crawlers/ Spiders, Scanners, and brute forcers.
  • Explore tools specifics for certain tasks or scenarios
Testing Environment We need to set up the testing environment and we would use VirtualBox, VM, text editor, and the vulnerable Web application we are going to use as target of our tests.
  • Install VirtualBox to run our Lab VM
  • Access the testing application
  • Finally we are going to see the text editor and an important warning
Testing Environment We need to set up the testing environment and we would use VirtualBox, VM, text editor, and the vulnerable Web application we are going to use as target of our tests.
  • Install VirtualBox to run our Lab VM
  • Access the testing application
  • Finally we are going to see the text editor and an important warning
Testing Environment We need to set up the testing environment and we would use VirtualBox, VM, text editor, and the vulnerable Web application we are going to use as target of our tests.
  • Install VirtualBox to run our Lab VM
  • Access the testing application
  • Finally we are going to see the text editor and an important warning
Testing Environment We need to set up the testing environment and we would use VirtualBox, VM, text editor, and the vulnerable Web application we are going to use as target of our tests.
  • Install VirtualBox to run our Lab VM
  • Access the testing application
  • Finally we are going to see the text editor and an important warning
We need to set up the testing environment and we would use VirtualBox, VM, text editor, and the vulnerable Web application we are going to use as target of our tests.
  • Install VirtualBox to run our Lab VM
  • Access the testing application
  • Finally we are going to see the text editor and an important warning
We need to set up the testing environment and we would use VirtualBox, VM, text editor, and the vulnerable Web application we are going to use as target of our tests.
  • Install VirtualBox to run our Lab VM
  • Access the testing application
  • Finally we are going to see the text editor and an important warning
Interacting with Web Applications 4 lectures 32:53 HTTP Protocol Basics This video introduces HTTP, how it works, and the different methods available to communicate with an HTTP server.
  • Introduce HTTP and how it works
  • Cover the secure version of HTTP(S)
  • Cover the different methods available to communicate with a server
Anatomy of an HTTP Request You’ll understand the anatomy of an HTTP request in order to make your own tools.
  • Explain the different parts of a URL
  • Understand the headers of a request and a response
  • Perform our first request with Telnet
Interacting with Web Apps Using Requests Library We want to learn how to send HTTP request with Python.
  • Start reviewing Requests library
  • Create our first script using requests library
  • Examine some Head/headers and post requests examples
Analyzing the Responses In this video, we are going to learn about HTTP response codes.
  • Introduce the different classes of responses
  • Write scripts to see success and failure codes
  • Write a script to see a URL redirection in action
Interacting with Web Applications. 4 lectures 32:53 HTTP Protocol Basics This video introduces HTTP, how it works, and the different methods available to communicate with an HTTP server.
  • Introduce HTTP and how it works
  • Cover the secure version of HTTP(S)
  • Cover the different methods available to communicate with a server
Anatomy of an HTTP Request You’ll understand the anatomy of an HTTP request in order to make your own tools.
  • Explain the different parts of a URL
  • Understand the headers of a request and a response
  • Perform our first request with Telnet
Interacting with Web Apps Using Requests Library We want to learn how to send HTTP request with Python.
  • Start reviewing Requests library
  • Create our first script using requests library
  • Examine some Head/headers and post requests examples
Analyzing the Responses In this video, we are going to learn about HTTP response codes.
  • Introduce the different classes of responses
  • Write scripts to see success and failure codes
  • Write a script to see a URL redirection in action
HTTP Protocol Basics This video introduces HTTP, how it works, and the different methods available to communicate with an HTTP server.
  • Introduce HTTP and how it works
  • Cover the secure version of HTTP(S)
  • Cover the different methods available to communicate with a server
HTTP Protocol Basics This video introduces HTTP, how it works, and the different methods available to communicate with an HTTP server.
  • Introduce HTTP and how it works
  • Cover the secure version of HTTP(S)
  • Cover the different methods available to communicate with a server
HTTP Protocol Basics This video introduces HTTP, how it works, and the different methods available to communicate with an HTTP server.
  • Introduce HTTP and how it works
  • Cover the secure version of HTTP(S)
  • Cover the different methods available to communicate with a server
HTTP Protocol Basics This video introduces HTTP, how it works, and the different methods available to communicate with an HTTP server.
  • Introduce HTTP and how it works
  • Cover the secure version of HTTP(S)
  • Cover the different methods available to communicate with a server
This video introduces HTTP, how it works, and the different methods available to communicate with an HTTP server.
  • Introduce HTTP and how it works
  • Cover the secure version of HTTP(S)
  • Cover the different methods available to communicate with a server
This video introduces HTTP, how it works, and the different methods available to communicate with an HTTP server.
  • Introduce HTTP and how it works
  • Cover the secure version of HTTP(S)
  • Cover the different methods available to communicate with a server
Anatomy of an HTTP Request You’ll understand the anatomy of an HTTP request in order to make your own tools Extracting Information We need to extract...

Additional information

Familiarity with Python is essential, but not to an expert level

Learning Python Web Penetration Testing

£ 12 + VAT