- Intro 1
- Course IntroductionLecture1.1
- Preparation - Creating a Penetration Testing Lab 6
- Lab Overview & Needed SoftwareLecture2.106 min
- Initial PreparationLecture2.209 min
- Installing Kali Linux as a VM on WindowsLecture2.309 min
- Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture2.409 min
- Installing Kali Linux as a VM on LinuxLecture2.511 min
- Installing Metasploitable As a Virtual MachineLecture2.605 min
- Preparation - Linux Basics 4
- Basic Overview Of Kali LinuxLecture3.105 min
- The Linux Terminal & Basic Linux CommandsLecture3.210 min
- More Powerful Linux Terminals with AI FeaturesLecture3.305 min
- Configuring Metasploitable & Lab Network SettingsLecture3.404 min
- Website Basics 2
- What Is a Website?Lecture4.105 min
- How To Hack a Website?Lecture4.206 min
- Information Gathering 9
- Gathering Information Using Whois LookupLecture5.105 min
- Discovering Technologies Used On The WebsiteLecture5.206 min
- Gathering Comprehensive DNS InformationLecture5.310 min
- Discovering Websites On The Same ServerLecture5.404 min
- Discovering SubdomainsLecture5.507 min
- Discovering Sensitive FilesLecture5.607 min
- Analyzing Discovered FilesLecture5.704 min
- Maltego – Discovering Servers, Domains & FilesLecture5.808 min
- Maltego – Discovering Websites, Hosting Provider & EmailsLecture5.9
- File Upload Vulnerabilities 6
- How To Discover & Exploit Basic File Upload Vulnerabilities to Hack WebsitesLecture6.107 min
- GET & POST RequestsLecture6.2
- Intercepting RequestsLecture6.308 min
- Exploiting Advanced File Upload Vulnerabilities To Hack WebsitesLecture6.4
- Exploiting More Advanced File Upload VulnerabilitiesLecture6.507 min
- [Security] Fixing File Upload VulnerabilitiesLecture6.606 min
- Code Execution Vulnerabilities 3
- How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack WebsitesLecture7.107 min
- Exploiting Advanced Code Execution VulnerabilitiesLecture7.206 min
- [Security] – Fixing Code Execution VulnerabilitiesLecture7.306 min
- Local File Inclusion Vulnerabilities (LFI) 2
- What are they? And How To Discover & Exploit ThemLecture8.106 min
- Gaining Shell Access From LFI VulnerabilitiesLecture8.207 min
- Remote File Inclusion Vulnerabilities (RFI) 4
- Remote File Inclusion Vulnerabilities – Configuring PHP SettingsLecture9.104 min
- Remote File Inclusion Vulnerabilities – Discovery & ExploitationLecture9.206 min
- Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack WebsitesLecture9.303 min
- [Security] Fixing File Inclusion VulnerabilitiesLecture9.406 min
- SQL Injection Vulnerabilities 2
- What is SQL?Lecture10.106 min
- Dangers of SQL InjectionsLecture10.203 min
- SQL Injection Vulnerabilities - SQLi In Login Pages 4
- Discovering SQL Injections In POSTLecture11.108 min
- Bypassing Logins Using SQL Injection VulnerabilityLecture11.205 min
- Bypassing More Secure Logins Using SQL InjectionsLecture11.306 min
- [Security] Preventing SQL Injections In Login PagesLecture11.408 min
- SQL injection Vulnerabilities - Extracting Data From The Database 4
- Discovering SQL Injections in GETLecture12.107 min
- Reading Database InformationLecture12.205 min
- Finding Database TablesLecture12.304 min
- Extracting Sensitive Data Such As PasswordsLecture12.404 min
- SQL injection Vulnerabilities - Advanced Exploitation 11
- Discovering & Exploiting Blind SQL InjectionsLecture13.1
- Discovering Complex SQL Injection VulnerabilitiesLecture13.207 min
- Exploiting an advanced SQL Injection Vulnerability to Extract PasswordsLecture13.305 min
- Bypassing FiltersLecture13.405 min
- Bypassing Security & Accessing All RecordsLecture13.509 min
- [Security] Quick Fix To Prevent SQL InjectionsLecture13.6
- Reading & Writing Files On The Server Using SQL InjectionLecture13.706 min
- Getting A Shell & Controlling The Target Server Using an SQL InjectionLecture13.808 min
- Discovering SQL Injections & Extracting Data Using SQLmapLecture13.907 min
- Getting a Direct SQL Shell using SQLmapLecture13.1003 min
- [Security] – The Right Way To Prevent SQL Injection VulnerabilitiesLecture13.1105 min
- XSS Vulnerabilities 6
- Introduction – What is XSS or Cross Site Scripting?Lecture14.103 min
- Discovering Basic Reflected XSSLecture14.204 min
- Discovering Advanced Reflected XSSLecture14.305 min
- Discovering An Even More Advanced Reflected XSSLecture14.407 min
- Discovering Stored XSSLecture14.503 min
- Discovering Advanced Stored XSSLecture14.604 min
- XSS Vulnerabilities - Exploitation 14
- Installing Windows As a Virtual MachineLecture15.106 min
- Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture15.205 min
- Hooking Victims To BeEF Using Reflected XSSLecture15.306 min
- Hooking Victims To BeEF Using Stored XSSLecture15.404 min
- Interacting With Hooked TargetsLecture15.504 min
- Running Basic Commands On VictimsLecture15.604 min
- Stealing Credentials/Passwords Using A Fake Login PromptLecture15.702 min
- Bonus – Installing Veil FrameworkLecture15.804 min
- Bonus – Veil Overview & Payloads BasicsLecture15.907 min
- Bonus – Generating An Undetectable Backdoor Using Veil 3Lecture15.1010 min
- Bonus – Listening For Incoming ConnectionsLecture15.1107 min
- Bonus – Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10Lecture15.1207 min
- Gaining Full Control Over Windows TargetLecture15.1304 min
- [Security] Fixing XSS VulnerabilitiesLecture15.1407 min
- Insecure Session Management 5
- Logging In As Admin Without a Password By Manipulating CookiesLecture16.106 min
- Discovering Cross Site Request Forgery Vulnerabilities (CSRF)Lecture16.207 min
- Exploiting CSRF To Change Admin Password Using a HTML FileLecture16.307 min
- Exploiting CSRF Vulnerabilities To Change Admin Password Using LinkLecture16.4
- [Security] The Right Way To Prevent CSRF VulnerabilitiesLecture16.509 min
- Brute Force & Dictionary Attacks 3
- Introduction to Brute Force & Dictionary Attacks?Lecture17.104 min
- Creating a WordlistLecture17.207 min
- Guessing Login Password Using a Wordlist Attack With HydraLecture17.314 min
- Discovering Vulnerabilities Automatically Using Owasp ZAP 2
- Scanning Target Website For VulnerabilitiesLecture18.104 min
- Analysing Scan ResultsLecture18.204 min
- Post Exploitation 12
- Post Exploitation IntroductionLecture19.104 min
- Executing System Commands On Hacked Web ServersLecture19.207 min
- Escalating Reverse Shell Access To Weevely ShellLecture19.308 min
- Weevely Basics – Accessing Other Websites, Running Shell Commands …etcLecture19.407 min
- Bypassing Limited Privileges & Executing Shell CommandsLecture19.5
- Downloading Files From Target WebserverLecture19.605 min
- Uploading Files To Target WebserverLecture19.708 min
- Getting a Reverse Connection From WeevelyLecture19.808 min
- Accessing The DatabaseLecture19.909 min
- ConclusionLecture19.1005 min
- Writing a Pentest ReportLecture19.1114 min
- 4 Ways to Secure Websites & AppsLecture19.1209 min
- Bonus Section 1
- Bonus Lecture – What’s Next?Lecture20.1
This content is protected, please login and enroll course to view this content!
4 Ways to Secure Websites & Apps
Prev 