- Introduction 3
- Lecture1.103 min
- Lecture1.2
- Lecture1.305 min
- Information Disclosure vulnerabilities 8
- Lecture2.1
- Lecture2.209 min
- Lecture2.308 min
- Lecture2.408 min
- Lecture2.508 min
- Lecture2.606 min
- Lecture2.707 min
- Lecture2.810 min
- Broken Access Control Vulnerabilities 6
- Lecture3.1
- Lecture3.2
- Lecture3.307 min
- Lecture3.409 min
- Lecture3.510 min
- Lecture3.608 min
- Path / Directory Traversal 7
- Lecture4.109 min
- Lecture4.205 min
- Lecture4.304 min
- Lecture4.404 min
- Lecture4.504 min
- Lecture4.606 min
- Lecture4.709 min
- CSRF - Cross-Site Request Forgery 1
- Lecture5.109 min
- OAUTH 2.0 Vulnerabilities 4
- Lecture6.1
- Lecture6.210 min
- Lecture6.312 min
- Lecture6.413 min
- Injection Vulnerabilities 1
- Lecture7.1
- OS Command Injection 4
- Lecture8.108 min
- Lecture8.209 min
- Lecture8.308 min
- Lecture8.405 min
- XSS - Cross Site Scripting 3
- Lecture9.104 min
- Lecture9.205 min
- Lecture9.305 min
- DOM XSS Vulnerabilities 6
- Lecture10.105 min
- Lecture10.206 min
- Lecture10.306 min
- Lecture10.406 min
- Lecture10.504 min
- Lecture10.604 min
- XSS - Bypassing Security 5
- Lecture11.106 min
- Lecture11.2
- Lecture11.310 min
- Lecture11.407 min
- Lecture11.509 min
- Bypassing Content Security Policy (CSP) 2
- Lecture12.106 min
- Lecture12.208 min
- SQL Injection Vulnerabilities 5
- Lecture13.107 min
- Lecture13.207 min
- Lecture13.305 min
- Lecture13.408 min
- Lecture13.507 min
- Blind SQL Injections 4
- Lecture14.106 min
- Lecture14.210 min
- Lecture14.308 min
- Lecture14.408 min
- Time-Based Blind SQL Injection 3
- Lecture15.108 min
- Lecture15.211 min
- Lecture15.3
- SSRF (Server-Side Request Forgery) 4
- Lecture16.1
- Lecture16.207 min
- Lecture16.305 min
- Lecture16.406 min
- SSRF - Advanced Exploitation 2
- Lecture17.106 min
- Lecture17.208 min
- SSRF - Bypassing Security 3
- Lecture18.108 min
- Lecture18.210 min
- Lecture18.307 min
- Blind SSRF Vulnerabilities 4
- Lecture19.1
- Lecture19.206 min
- Lecture19.308 min
- Lecture19.408 min
- XXE (XML External Entity) Injection 4
- Lecture20.1
- Lecture20.203 min
- Lecture20.309 min
- Lecture20.407 min
- 2 Hour Live Bug Hunting ! 14
- Lecture21.1
- Lecture21.209 min
- Lecture21.307 min
- Lecture21.409 min
- Lecture21.509 min
- Lecture21.606 min
- Lecture21.706 min
- Lecture21.812 min
- Lecture21.904 min
- Lecture21.1004 min
- Lecture21.1109 min
- Lecture21.1211 min
- Lecture21.1308 min
- Lecture21.1407 min
- Participating in Bug Bounty Programs 3
- Lecture22.110 min
- Lecture22.206 min
- Lecture22.308 min
- Bonus Section 1
- Lecture23.103 min
Introduction to Information Disclosure Vulnerabilities
Information disclosure vulnerabilities are the second most common vulnerabilities according to OWASP.
This is an introduction lecture to introduce you to these vulnerabilities and give you a brief overview of the contents of this section.