 
        
      Darslik orqali natijalar
Shogirdlarimiz xalqaro Bug Bounty dasturlar orqali o'zlarini ko'rsata olishgan. Amazon, Alibaba kabi yirik tashkilotlar tizimida zaifliklarni aniqlay olishgan va mukofot olishgan.
Darslik nimalardan iborat?
- SMS hujum websaytlar orqali qanday qilinadi?
- Savdo websaytlari qanday buziladi?
- CMSlarni pentest qilish;
- XSS ni RCE ga aylantirish;
- Zaifliklar va alohida zaiflik guruhlari:
- Amaliyot va 4 xil labaratoriya;
- Privilege escalation ni RCE ga aylantirish va ushbu zaifliklar uchun himoya usullari!
Dars reja
    
    Kirish
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Tarmoq
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Tayyorgarlik
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Linux tizimi
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Zaifliklar
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - Zaifliklar (19:17)
- XSS va XSS turlari (62:53)
- Blind XSS zaifligi, XSS zaifligini qayerdan qidirish kerak? (25:20)
- HTML inyeksiya (6:36)
- Open redirect (9:54)
- SSRF zaifligi (48:49)
- IDOR zaifligi (12:31)
- SQL inyeksiya zaifligi turlari (56:09)
- SQL inyeksiya zaifligi (25:52)
- Union based SQL injection (80:26)
- Boolean based SQL injection (56:25)
- Time based SQL injection (46:32)
- Out of band SQL injection (27:15)
- Error based SQL injection (5:41)
- SQLmap - hujumni avtomatlashtirish (28:15)
- SQL inyeksiya - xulosa (5:06)
- Infomation disclosure (23:20)
- Command injection (37:17)
- File upload zaifliklari (47:19)
- Directory traversal (26:39)
- File inclusion zaifligi (21:09)
- Directory listing orqali zaiflik (6:32)
    
    Zaiflik guruhlari
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Metasploit
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Web dasturlar xavfsizligini tekshirish
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - Pentest jarayoni (9:01)
- Web dasturlarni pentest qilish (18:03)
- Passiv ma'lumotlar to'plash (31:05)
- Subdomainlar topish (10:24)
- Directory fuzzing (9:38)
- FHC va FFF (13:31)
- Parametrlar topish (8:07)
- Checklist (3:35)
- Manual scan (32:50)
- OWASP ZAP o'rnatish (1:42)
- Avtomatik scan (14:32)
- Hisobot yozish (26:08)
    
    CMSlarni pentest qilish
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    Xulosa
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    