Web Hacking for Beginners

61 CQ
11 Lessons
Previous...
  • Playing
    8 CQ
    6. Configuring WordPress on Kali Linux
    A lesson with Test Prep and Cyber Security
    View lesson

    In this SQL lesson learn to install WordPress on a Kali Linux distribution. Once finished, you'll have a working WordPress server with users you can hack later!

    In this SQL lesson learn to install WordPress on a Kali Linux distribution. Once finished, you'll have a working WordPress server with users you can hack later!

  • Playing
    6 CQ
    7. Using NMAP to Learn About Target Servers
    A lesson with Test Prep and Cyber Security
    View lesson

    In this hacking lesson get a quick introduction to Nmap, a network mapping tool that lets you learn about operating systems, applications, and open ports.

    In this hacking lesson get a quick introduction to Nmap, a network mapping tool that lets you learn about operating systems, applications, and open ports.

  • Playing
    7 CQ
    8. Understanding SQL Injection Attacks
    A lesson with Test Prep and Cyber Security
    View lesson

    Using the virtual machine you've already built—and by employing the hacker methodology—learn about a very popular attack, called an SQL injection.

    Using the virtual machine you've already built—and by employing the hacker methodology—learn about a very popular attack, called an SQL injection.

  • Playing
    4 CQ
    9. Practicing Cross Site Scripting Attacks
    A lesson with Test Prep and Cyber Security
    View lesson

    Learn all about cross-site scripting (XSS) in this lesson, including why a hacker would want to use an XSS attack, and what it takes to perform an XSS attack.

    Learn all about cross-site scripting (XSS) in this lesson, including why a hacker would want to use an XSS attack, and what it takes to perform an XSS attack.

  • Playing
    6 CQ
    10. Using a Brute Force Attack on WordPress
    A lesson with Test Prep and Cyber Security
    View lesson

    In this essential cyber security lesson, discover how to use WPScan to execute brute force and dictionary-based attacks to obtain user passwords.

    In this essential cyber security lesson, discover how to use WPScan to execute brute force and dictionary-based attacks to obtain user passwords.

More...
  • Recommended Recommended
  • History & In Progress History
  • Browse Library
  • Most Popular Library

Get Personalized Recommendations

Let us help you figure out what to learn! By taking a short interview you’ll be able to specify your learning interests and goals, so we can recommend the perfect courses and lessons to try next.

Start Interview

You don't have any lessons in your history.
Just find something that looks interesting and start learning!

Comments
500 characters max