#1 Bestseller on Amazon

Volume 2 Web Hacking

Learn how to hack and defend Web applications, the computing infrastructure that contains them, databases, passwords, and more.

Available on

Amazon Logo
Kindle Logo
Google Logo

* By purchasing a hard-copy on Amazon you will support the project and enjoy a real book to read from the comfort of where you want.

To get started

Web Attacks

In the course you will learn how to attack Web applications and the infrastructure around them: you will see how to build a study lab where you can apply the most well-known cyber attack techniques against Web applications (such as Wordpress, Joomla or CMSs, including proprietary ones) through feature analysis, white and black box approaches, the study of IDS and much, much more!

Information Gathering

Learn how to gather information to convey a cyber attack through the Web, like real cyber criminals, so you can defend yourself.

Cyber attacks

From domain and host attacks to web app-specific attacks (SQL Injection, XSS, Remote file Inclusion, File Upload, Phishing) and popular CMSs.

Post Attack

Techniques and tools used in the aftermath of a cyber attack, such as APT methodologies, Command Shell and monitoring of breached servers, along with related defense mechanisms.

Scanning

Automated analysis tools such as Metasploit Framework and Web Application Security Scanner, so you can understand cyber breaches and learn how to defend yourself.

Looking for the digital copy?

Hacklog, Volume 2 Web Hacking is distributed in the various PDF, EPUB, MOBI formats on the web. Choose one of the providers below to get started.

Subtitled for the deaf

Video Series

Hacklog, Volume 2 Web Hacking is also available in subtitled video format, so you can follow along in the passages you find most difficult.

Looking for the soundtrack of the series?

Hanno parlato di noi

Hacker Journal Logo
Lega Nerd Logo
Tom's Hardware Logo
Logo Techradar
Questo sito non utilizza cookie o sistemi di tracciamento.