Join Malcolm Shore for an in-depth discussion in this video Course disclaimer, part of Ethical Hacking: Website and Web Application Testing.
- [Instructor] This is one of a series of ethical hacking courses. And in addition to Kali Linux, it uses some third party testing software. While we've done our best to ensure that the tools we use and the sites we reference are legitimate, testing sites can be targets for hackers. And we can't provide any assurance that these sites might not be compromised when you visit them. Some of the sites which store the testing tools are detected as dangerous, but there's the tools have similar signatures to malware, and may raise antivirus alerts when you visit them. The testing tools we demonstrate are extremely powerful.
They may demonstrate some of the same signature characteristics as malware and malicious implants, and may raise antivirus alerts when you try to download them. Again, we can't provide assurance that the software hasn't been compromised when you download it, and so as for any other software from the internet, you need to exercise due diligence and take personal responsibility for anything you load into your system. The testing is mostly carried out inside a virtual environment to contain any unplanned effects of testing tools. And in the unlikely event that you do download malware, this will also help contain any impact from live malware.
Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Dissecting HTTP/HTTPS protocol
- Working with WebSockets
- Understanding cookies
- Installing testing tools such as Hacme Casino and the Vega Scanner
- Running web application tests
- Practicing your skills