Ethical Hacking Practical Tutorials [Part 1]


Today, I want to start the writing on the ethical hacking. But before going to further in the Ethical Hacking Course, I introduced myself once again. I am Rana Faisal Munir, working on Semantic based Web Application Firewall at SEECS-NUST, Islamabad as a Web Application Security Researcher. My research work is to analyze the web application attacks, and how effectively we can detect them.  During my study on the web application attacks, I also practically launched these attacks manually or by using different tools. I also used my skills for penetration testing.

I start this series of tutorial to share my experience with you guys, so that you can used my knowledge to test your site for potential vulnerabilities and how you can fix them to make your site secure.

In this Ethical Hacking course, we will cover the following topics

  1. Understanding of Web Application as an Attacker Point of View
  2. Information Gathering
  3. Cross Site Scripting Attack
    1. Reflected
    2. Stored
  4. SQL Injection Attack
  5. Local and Remote File Inclusion
  6. Shell Uploading
  7. Cross Site Request Forgery Attack
  8. Parameter Manipulation
  9. Session Fixation
  10. Brute Force Attack
  11. AJAX Testing
  12. Use of Intermediate Proxy
  13. Use of Vulnerabilities Scanners
  14. Use of Exploitation Tools [Metasploit]


Rana Faisal Munir