PluralSight - Web App Pen Testing - Reconnaissance

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size334.8 MB
  • Uploaded Byfreecoursewb
  • Downloads41
  • Last checkedDec. 15th '23
  • Date uploadedDec. 14th '23
  • Seeders 11
  • Leechers6

Infohash : 9994863DB2CBA436C452619AB8B1E1228EBDE997

Web App Pen Testing: Reconnaissance

https://CourseWikia.com

Released 11/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Intermediate | Genre: eLearning | Language: English + vtt | Duration: 1h 14m | Size: 335 MB

Reconnaissance, the first critical phase of penetration testing, is critical in understanding the attack surface of a target web application. This course lays the foundation for becoming a skilled web app penetration tester.

Building a strong foundation for a Web Application Penetration Test is critical for success. In this course, Web App Pen Testing: Reconnaissance, you’ll learn to thoroughly plan a Web App Pen Test and begin to apply the Web App Pen Testing methodology through reconnaissance. First, you’ll learn some key terms and concepts that synchronize your vocabulary with the industry. This will include exploring the various Web App Security Testing methods and types as you make work your way towards gaining a thorough understanding of the Dynamic Web App Pen Testing methodology. Next, you’ll cover the Web Application Security Test Planning process to ensure conditions are set for a successful and legal engagement. Finally, you’ll learn how to begin applying the Web App Pen Testing methodology by passively gathering information about the target and its environment from external sources. When you’re finished with this course, you’ll have the skills and knowledge of Web App Pen Testing needed to prepare for and begin conducting a successful Web App Pen Test.

Homepage

Files:

[ CourseWikia.com ] PluralSight - Web App Pen Testing - Reconnaissance
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 04. Methodology - Reconnaissance
    • 01. Introduction to Reconnaissance.mp4 (13.9 MB)
    • 01. Introduction to Reconnaissance.vtt (4.8 KB)
    • 02. Reconnaissance Objectives.mp4 (9.6 MB)
    • 02. Reconnaissance Objectives.vtt (3.0 KB)
    • 03. Harvesting Contacts and User Profiles.mp4 (14.3 MB)
    • 03. Harvesting Contacts and User Profiles.vtt (3.9 KB)
    • 04. Harvesting Breach Data.mp4 (10.7 MB)
    • 04. Harvesting Breach Data.vtt (3.7 KB)
    • 05. Enumerating Technologies and Configurations.mp4 (7.1 MB)
    • 05. Enumerating Technologies and Configurations.vtt (2.4 KB)
    • 06. Demo - Enumerating Technologies with IoT Search Engines.mp4 (45.9 MB)
    • 06. Demo - Enumerating Technologies with IoT Search Engines.vtt (18.4 KB)
    • 07. Searching for Disclosed Vulnerabilities.mp4 (5.9 MB)
    • 07. Searching for Disclosed Vulnerabilities.vtt (2.1 KB)
    • 08. Mining for Sensitive Information.mp4 (7.4 MB)
    • 08. Mining for Sensitive Information.vtt (2.8 KB)
    • 09. Search Engine Hacking.mp4 (13.6 MB)
    • 09. Search Engine Hacking.vtt (4.2 KB)
    • 10. Demo - Mining Sensitive Information.mp4 (42.2 MB)
    • 10. Demo - Mining Sensitive Information.vtt (18.0 KB)
    1. Course Overview
    • 1. Course Overview.mp4 (6.2 MB)
    • 1. Course Overview.vtt (2.8 KB)
    2. Web Application Testing Methodologies
    • 1. Web App Pen Testing Introduction.mp4 (10.8 MB)
    • 1. Web App Pen Testing Introduction.vtt (4.1 KB)
    • 2. Web App Security Testing Methods.mp4 (5.1 MB)
    • 2. Web App Security Testing Methods.vtt (2.5 KB)
    • 3. Dynamic Web Application Security Testing Types.mp4 (20.7 MB)
    • 3. Dynamic Web Application Security Testing Types.vtt (6.2 KB)
    • 4. Determining the Dynamic Web Application Security Testing Types.mp4 (3.1 MB)
    • 4. Determining the Dynamic Web Application Security Testing Types.vtt (1.7 KB)
    • 5. Dynamic Web App Pen Testing Methodology.mp4 (16.4 MB)
    • 5. Dynamic Web App Pen Testing Methodology.vtt (6.8 KB)
    • 6. Path Scenario.mp4 (10.1 MB)
    • 6. Path Scenario.vtt (3.2 KB)
    3. Web Application Security Test Planning Process
    • 1. The Planning Process.mp4 (3.0 MB)
    • 1. The Planning Process.vtt (1.0 KB)
    • 2. Scoping Techniques.mp4 (29.6 MB)
    • 2. Scoping Techniques.vtt (10.1 KB)
    • 3. Scoping Considerations for Dynamic Environments.mp4 (25.4 MB)
    • 3. Scoping Considerations for Dynamic Environments.vtt (8.1 KB)
    • 4. Contracting.mp4 (19.4 MB)
    • 4. Contracting.vtt (5.6 KB)
    • 5. Kickoff.mp4 (14.5 MB)
    • 5. Kickoff.vtt (4.8 KB)
    • Bonus Resources.txt (0.4 KB)
    • playlist.m3u (1.7 KB)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce