Wireless network technology is widely used but at the same time, it has many security weaknesses. Several reports have explained weaknesses in the Wired Equivalent Privacy (WEP) & Wi-Fi Protected Setup (WPS) to encrypt wireless data. Before understanding the benefits …
Hey guys! This video will guide you on the most common attacks that can be done by hackers on websites. We will go over 4 ways that hackers use to hack into a website and how to secure a website …
Introduction to Volatility Framework. In this video we will explore how to use Volatility to analyze your computer’s memory snapshot and uncover hidden clues about what’s been happening on it.
VHOST Enumeration with Gobuster and FFUF. In this video I’ll showcase the methods to effectively enumerate virtual hosts using two powerful tools: Gobuster and FFUF. This guide is going to help you to enhance your skill in identifying and enumerating …
This video will discuss the file upload vulnerability on Apache servers using the help of HT access files. Sample content used in .htaccess file. It can be customised based on your choice.
This video will teach you the basics of Cross-Site Request Forgery or CSRF vulnerabilities, how to discover them and how to exploit them in a real-life practical example. Resources: Target Website Link.