1 00:00:00,520 --> 00:00:06,850 Now it's time to learn about website hacking, our Web application penetration testing. 2 00:00:08,250 --> 00:00:15,420 But first of all, you must know that what is a website, because if you don't know what a website is, 3 00:00:15,660 --> 00:00:20,180 then how can you able to perform attacks on any website? 4 00:00:20,700 --> 00:00:21,020 Right. 5 00:00:21,810 --> 00:00:26,130 Then we will learn what is a Web server, for example. 6 00:00:26,610 --> 00:00:34,260 A budget is a very popular Web server around the world because more than 60 percent of the websites 7 00:00:34,260 --> 00:00:42,200 are running on a party server and Apache Web server runs on Linux right now. 8 00:00:42,210 --> 00:00:48,870 If you don't know about Apache Web server, then you must go with a second last section of this course, 9 00:00:48,870 --> 00:00:55,050 which is Linux for beginners, and go to the last lecture of that section, which consist of what is 10 00:00:55,050 --> 00:00:58,110 a you upset about and how you can configure it. 11 00:00:58,950 --> 00:00:59,280 Right. 12 00:01:00,210 --> 00:01:03,020 Then we will perform footprinting of websites. 13 00:01:03,360 --> 00:01:11,520 It is very important to perform collection of information of our target before launching attacks. 14 00:01:12,780 --> 00:01:19,980 As you know, if you are performing system hacking or you are performing networking or you are performing 15 00:01:19,980 --> 00:01:27,480 website hacking, collection of information is the very first step you must follow right then. 16 00:01:28,910 --> 00:01:37,490 We will perform two of two or three of the major attacks like Eskil and Excess or CROSSEYED scripting 17 00:01:37,820 --> 00:01:46,640 and denial of service attack or distributed denial of service attack on both virtual and life websites. 18 00:01:47,670 --> 00:01:54,330 Now, it is very important to perform all of these attacks first in the virtual environment, because 19 00:01:54,720 --> 00:01:58,080 you are just developing your skills of website hacking. 20 00:01:59,630 --> 00:02:07,190 Using virtual environment, you won't lose any of your data, right, and you will also gain some of 21 00:02:07,190 --> 00:02:08,290 the important skills. 22 00:02:09,140 --> 00:02:15,380 So if you learn any new tool or techniques from the Internet, it is best to perform it first in the 23 00:02:15,380 --> 00:02:16,340 virtual environment. 24 00:02:16,640 --> 00:02:21,770 And once you become comfortable, then only you will go for the Web site hacking. 25 00:02:22,280 --> 00:02:22,640 Right. 26 00:02:23,210 --> 00:02:30,740 And remember, you only perform live upset hacking by taking all the required permissions from the owner 27 00:02:30,740 --> 00:02:31,640 of the website. 28 00:02:32,730 --> 00:02:40,410 OK, so in my case, I am going to use a virtual environment that I have installed three different systems. 29 00:02:40,950 --> 00:02:43,910 The first virtual machine is running on Windows 10. 30 00:02:44,430 --> 00:02:46,610 The second is running on Galili next. 31 00:02:46,620 --> 00:02:51,320 And the third one is Mehta's Floatable, which will act as a Web server. 32 00:02:52,140 --> 00:02:58,170 And it has enabled some of the demo websites to perform these attacks. 33 00:02:59,120 --> 00:03:07,010 Right now, it is not necessary to create a new virtual and moment, you can use your previously configured 34 00:03:07,010 --> 00:03:10,550 virtual machines as we have created at the time of system hacking.