In this video, we are going to learn about HTTP response codes.
- [Instructor] Hi and welcome to the final video…of this section.…In the previous video,…we started coding our first script…to interact with web applications.…In this video, we will learn about the different…HTTP response status codes.…We're going to learn about the different classes…of HTTP response codes,…and then write examples to see successful responses, errors,…and finally, we're going to see a redirection example.…The HTTP protocol defines five classes of response codes…to indicate the state of a request.…
The 100 range codes are used for informational purposes.…It is only present in HTTP 1.1.…A 200 range of codes are used to indicate…that the action requested by the client…was received, understood, accepted, and processed.…The most common is the 200 OK.…The 300 range indicates the client…that must take additional action…to complete the request.…
Most of these codes are used in URL redirection.…The most common of this group…is the 302 found code.…The 400 range are used to indicate…that the client has had an error.…
Stop using automated testing tools. Customize and write your own tests with Python! While there are an increasing number of sophisticated ready-made tools to scan systems for vulnerabilities, Python allows testers to write system-specific scripts—or alter and extend existing testing tools—to find, exploit, and record as many security weaknesses as possible. This course will give you the necessary skills to write custom tools for different scenarios and modify existing Python tools to suit your application's needs.
Christian Martorella starts off by providing an overview of the web application penetration testing process and the tools the professionals use to perform these tests. Next he shows how to interact with web applications using Python, HTTP, and the Requests library. Then follow the web application penetration testing methodology. Each section contains practical Python examples. To finish off, Christian shows how to use the tools against a vulnerable web application created specifically for this course.
- Understanding web penetration testing
- Interacting with web applications via HTTP and the Requests library
- Analyzing HTTP responses
- Web crawling with Scrapy
- Extracting information
- Discovering resources
- Testing passwords
- Detecting and exploiting SQL injection vulnerabilities
- Intercepting HTTP requests
Skill Level Intermediate
2. Interacting with Web Applications
3. Web Crawling with Scrapy
4. Resources Discovery
5. Password Testing
How password attacks work4m 56s
6. Detecting and Exploiting SQL Injection Vulnerabilities
7. Intercepting HTTP Requests
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.