-
Intro 1
-
Lecture1.1
-
-
Preparation - Creating a Penetration Testing Lab 6
-
Lecture2.106 min
-
Lecture2.209 min
-
Lecture2.309 min
-
Lecture2.410 min
-
Lecture2.511 min
-
Lecture2.604 min
-
-
Preparation - Linux Basics 3
-
Lecture3.105 min
-
Lecture3.213 min
-
Lecture3.304 min
-
-
Website Basics 2
-
Lecture4.104 min
-
Lecture4.205 min
-
-
Information Gathering 9
-
Lecture5.105 min
-
Lecture5.206 min
-
Lecture5.310 min
-
Lecture5.404 min
-
Lecture5.504 min
-
Lecture5.607 min
-
Lecture5.704 min
-
Lecture5.808 min
-
Lecture5.9
-
-
File Upload Vulnerabilities 6
-
Lecture6.107 min
-
Lecture6.2
-
Lecture6.308 min
-
Lecture6.4
-
Lecture6.506 min
-
Lecture6.606 min
-
-
Code Execution Vulnerabilities 3
-
Lecture7.107 min
-
Lecture7.206 min
-
Lecture7.306 min
-
-
Local File Inclusion Vulnerabilities (LFI) 3
-
Lecture8.106 min
-
Lecture8.2
-
Lecture8.310 min
-
-
Remote File Inclusion Vulnerabilities (RFI) 4
-
Lecture9.104 min
-
Lecture9.206 min
-
Lecture9.303 min
-
Lecture9.406 min
-
-
SQL Injection Vulnerabilities 2
-
Lecture10.106 min
-
Lecture10.203 min
-
-
SQL Injection Vulnerabilities - SQLi In Login Pages 4
-
Lecture11.108 min
-
Lecture11.205 min
-
Lecture11.306 min
-
Lecture11.408 min
-
-
SQL injection Vulnerabilities - Extracting Data From The Database 4
-
Lecture12.107 min
-
Lecture12.205 min
-
Lecture12.303 min
-
Lecture12.404 min
-
-
SQL injection Vulnerabilities - Advanced Exploitation 11
-
Lecture13.1
-
Lecture13.207 min
-
Lecture13.305 min
-
Lecture13.405 min
-
Lecture13.508 min
-
Lecture13.6
-
Lecture13.706 min
-
Lecture13.808 min
-
Lecture13.907 min
-
Lecture13.1003 min
-
Lecture13.1105 min
-
-
XSS Vulnerabilities 6
-
Lecture14.103 min
-
Lecture14.204 min
-
Lecture14.304 min
-
Lecture14.407 min
-
Lecture14.503 min
-
Lecture14.603 min
-
-
XSS Vulnerabilities - Exploitation 14
-
Lecture15.1
-
Lecture15.2
-
Lecture15.306 min
-
Lecture15.404 min
-
Lecture15.504 min
-
Lecture15.604 min
-
Lecture15.702 min
-
Lecture15.804 min
-
Lecture15.907 min
-
Lecture15.1010 min
-
Lecture15.1107 min
-
Lecture15.1207 min
-
Lecture15.1304 min
-
Lecture15.1407 min
-
-
Insecure Session Management 5
-
Lecture16.106 min
-
Lecture16.207 min
-
Lecture16.307 min
-
Lecture16.4
-
Lecture16.509 min
-
-
Brute Force & Dictionary Attacks 3
-
Lecture17.104 min
-
Lecture17.206 min
-
Lecture17.313 min
-
-
Discovering Vulnerabilities Automatically Using Owasp ZAP 2
-
Lecture18.104 min
-
Lecture18.204 min
-
-
Post Exploitation 12
-
Lecture19.1
-
Lecture19.207 min
-
Lecture19.308 min
-
Lecture19.406 min
-
Lecture19.5
-
Lecture19.605 min
-
Lecture19.708 min
-
Lecture19.808 min
-
Lecture19.909 min
-
Lecture19.1005 min
-
Lecture19.1114 min
-
Lecture19.1209 min
-
-
Bonus Section 1
-
Lecture20.1
-
Exploiting Advanced File Upload Vulnerabilities To Hack Websites
Now that we know how to intercept HTTP requests, in this lecture you will learn how to exploit a more secure file upload vulnerability and gain full control over the target web server.