Overview
The EC Council's interactive iLab environments include challenges for web application hackers and security professionals, ranging from Certified Ethical Hacker (CEH) to Certified Penetration Testing Professional (CPENT); from Certified Application Security Engineer (CASE).Java on the net. However, as you work through each issue, Web Application Hacking and Security moves beyond this to increasingly challenging situations.
Capture-the-Flag (CTF) competitions are similar to web application hacking and security in that they assess your hacking prowess. However, you can keep trying until you succeed. Try your abilities by working through challenging issues on your own or by following the instructor's walkthroughs to learn about Web Application Hacking and Security.
See your name appear on the leader board, where you can
- You will encounter security misconfigurations, SQL injection vulnerabilities, directory browsing vulnerabilities, enumeration vulnerabilities, and opportunities to escalate privileges and gain access to privileged information.
- Penetration Tester
- Vulnerability Assessment & Penetration Testing Consultant
Recommended
- Basic knowledge of OSes and file systems
- Basic working knowledge of the Linux command line
- Good understanding of web application working
- Basic knowledge of Bash and/or Python scripting