Ethical Hacking Website and Web Application Testing Course Free



Ethical Hacking Website and Web Application Testing Course Free....

What is Web Application Hacking?



Ethical Hacking Website and Web Application Testing Course Free ; Before we can start talking about that we need to understand what a website it is just like any sort of application running on your computer website is an application installed on a server in this sense server is a computer that probably just has better specs then your computer but fundamentally it works exactly the way your computer works so it has an operating system computer with some operating system and a number of web application to allow it to act as a web server now the main two application that it probably has is a web server and a database web server like Apache and a database like sequel these are the web servers that basically understand and execute the web application so web application are executed by the by the web servers so the web application will be written in on PHP or Python PHP or Python or any any other programming language really the only thing here is that web server needs one needs to be able to understand and execute this application the database contains the data used by the web application so all of this is stored on a computer called server the server is connected to the internet so and it has a real IP so anybody can access the computer and can ping it so the web application is executed by the web server which is installed on the server or on the target in our case so every time you send requests to access anything in a server it gets executed on the web server not on the client browser after executing it it sends a HTML page which is ready to be read by the client so I managed to create an instance let's say you are on your food or on your computer and you want to go to facebook.com so you type facebook.com into your url box this will be this will be translated using a DNS server to an IP address so DNS server right here translates this into its really IP address so there is a server that translates a domain or any website with a name into its relevant IP address you request facebook.com and this goes to a DNS server it translates facebook.com to the IP of the server where Facebook is stored then you reach the IP address and so then the server will execute the page that you want using all of the application that we spoke about and then just give you already HTML so what you get back is just a marker written in HTML which is a markup language all of the result of executing the program so here the program gets executed on the server and then you just get get the result back javascript on the other hand here are some websites that UTS and javascript is a client-side language this means that if you manage to find a website that allows you to run JavaScript code that it could will be executed by the time so even though could be injected into the web server it will be executed on the client server and it will give you privilege to do things to the client computer and not to the server so it's very important to separate between a client side and and server side angles so with the anticipation that you know the difference between server side and client side I would love to go ahead to another part so now this components leave us to knowing how we can hack a website and there is more than one thing that we can exploit to gain control of a website now the obvious thing that you reckon off is the web application that we've met that we can exploit the web application is an application installed on a server or on a computer so if we hack it or if we exploited then it is termed as web application hacking so the web application is the thing that you always interact with for instance on Facebook it is where you search for stuff or and where you upload pictures where you write your posts all of these things are handled by the web application because it is the thing that you click or interact with so if I could exploit this web application in some way or if I could gain access to it if I could connect to the database then I will be able to maybe gain access over the website or even the web server and add a paste over scenario to other web sites on the same server the other way of gaining access to website is attacking the computer itself so let's say you're committed plus facebook.com and you couldn't get in you couldn't find an exploit in the web application or database itself you tried everything possible we will talk about later on then your other option would be to exploit the programs installed on that computer because we said our web server our website is installed on a normal computer just like our home computer so if you couldn't get in using the web applications then what if there one of the programs installed has a buffer overflow or remote execution exploit what if the web web server itself or the database program has a possible exploit that allows you to just gain access to the whole web server including all the web sites inside it so this would be really cool right now again if we web application our server are immune to your attack then you could target the humans because we know websites are managed by humans for example facebook.com you can target shutterbug or you can target the employees working on it Facebook then then they might be able to upload sensitive file to the website and then you can control it and voila you hack it .



What is Ethical Hacking?


Ethical Hacking Website and Web Application Testing Course Free;  Ethical hacking the term ethical hacking is actually used in order to do hacking for a legal way or for a good purpose so the person's who performs ethical hacking is called ethical hackers so the job responsibilities or the functions of the ethical hacker is to perform penetration testing finding vulnerabilities in their own company's organization in order to protect their company's data so their job responsibilities are as follows so they actually their main goal is to protect systems of their organization to protect their data to eliminate any potential threat the ethical hackers do not perform hacking in order to do harm for a particular organization so now we know that the hacking is of two types so now let's discuss that what are the types of hackers.


 

Post a Comment

0 Comments