Learn how to hack and defend Web applications, the computing infrastructure that contains them, databases, passwords, and more.
Available on
* By purchasing a hard-copy on Amazon you will support the project and enjoy a real book to read from the comfort of where you want.
Web Attacks
In the course you will learn how to attack Web applications and the infrastructure around them: you will see how to build a study lab where you can apply the most well-known cyber attack techniques against Web applications (such as Wordpress, Joomla or CMSs, including proprietary ones) through feature analysis, white and black box approaches, the study of IDS and much, much more!
Information Gathering
Cyber attacks
Post Attack
Scanning
Hacklog, Volume 2 Web Hacking is distributed in the various PDF, EPUB, MOBI formats on the web. Choose one of the providers below to get started.
Video Series
Hacklog, Volume 2 Web Hacking is also available in subtitled video format, so you can follow along in the passages you find most difficult.
Looking for the soundtrack of the series?
Hanno parlato di noi