Introduction
Building the Labs
Shaping your skills and Tools
Getting Started on Web Hacking
information gathering
File Upload Vulnerabilities
Code Execution Vulnerabilities
Local File Inclusion Vulnerabilities
Remote File Inclusion Vulnerability
SQL Injection
Bypassing Logins Using SQLi
Extracting Database Information using SQLi
Advanced SQL Injection Exploitation
Cross Site Scripting
The Browser Exploitation Framework Project (BEEF)
Cross Site Request Forgery
Cracking Online Web Form Passwords
WEB Vulnerability Scanners
Course Conclusion