-
Intro 1
-
Course IntroductionLecture1.1
-
-
Preparation - Creating a Penetration Testing Lab 6
-
Lab Overview & Needed SoftwareLecture2.106 min
-
Initial PreparationLecture2.209 min
-
Installing Kali Linux as a VM on WindowsLecture2.309 min
-
Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture2.409 min
-
Installing Kali Linux as a VM on LinuxLecture2.511 min
-
Installing Metasploitable As a Virtual MachineLecture2.605 min
-
-
Preparation - Linux Basics 4
-
Basic Overview Of Kali LinuxLecture3.105 min
-
The Linux Terminal & Basic Linux CommandsLecture3.210 min
-
More Powerful Linux Terminals with AI FeaturesLecture3.305 min
-
Configuring Metasploitable & Lab Network SettingsLecture3.404 min
-
-
Website Basics 2
-
What Is a Website?Lecture4.105 min
-
How To Hack a Website?Lecture4.206 min
-
-
Information Gathering 9
-
Gathering Information Using Whois LookupLecture5.105 min
-
Discovering Technologies Used On The WebsiteLecture5.206 min
-
Gathering Comprehensive DNS InformationLecture5.310 min
-
Discovering Websites On The Same ServerLecture5.404 min
-
Discovering SubdomainsLecture5.507 min
-
Discovering Sensitive FilesLecture5.607 min
-
Analyzing Discovered FilesLecture5.704 min
-
Maltego – Discovering Servers, Domains & FilesLecture5.808 min
-
Maltego – Discovering Websites, Hosting Provider & EmailsLecture5.9
-
-
File Upload Vulnerabilities 6
-
How To Discover & Exploit Basic File Upload Vulnerabilities to Hack WebsitesLecture6.107 min
-
GET & POST RequestsLecture6.2
-
Intercepting RequestsLecture6.308 min
-
Exploiting Advanced File Upload Vulnerabilities To Hack WebsitesLecture6.4
-
Exploiting More Advanced File Upload VulnerabilitiesLecture6.507 min
-
[Security] Fixing File Upload VulnerabilitiesLecture6.606 min
-
-
Code Execution Vulnerabilities 3
-
How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack WebsitesLecture7.107 min
-
Exploiting Advanced Code Execution VulnerabilitiesLecture7.206 min
-
[Security] – Fixing Code Execution VulnerabilitiesLecture7.306 min
-
-
Local File Inclusion Vulnerabilities (LFI) 2
-
What are they? And How To Discover & Exploit ThemLecture8.106 min
-
Gaining Shell Access From LFI VulnerabilitiesLecture8.207 min
-
-
Remote File Inclusion Vulnerabilities (RFI) 4
-
Remote File Inclusion Vulnerabilities – Configuring PHP SettingsLecture9.104 min
-
Remote File Inclusion Vulnerabilities – Discovery & ExploitationLecture9.206 min
-
Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack WebsitesLecture9.303 min
-
[Security] Fixing File Inclusion VulnerabilitiesLecture9.406 min
-
-
SQL Injection Vulnerabilities 2
-
What is SQL?Lecture10.106 min
-
Dangers of SQL InjectionsLecture10.203 min
-
-
SQL Injection Vulnerabilities - SQLi In Login Pages 4
-
Discovering SQL Injections In POSTLecture11.108 min
-
Bypassing Logins Using SQL Injection VulnerabilityLecture11.205 min
-
Bypassing More Secure Logins Using SQL InjectionsLecture11.306 min
-
[Security] Preventing SQL Injections In Login PagesLecture11.408 min
-
-
SQL injection Vulnerabilities - Extracting Data From The Database 4
-
Discovering SQL Injections in GETLecture12.107 min
-
Reading Database InformationLecture12.205 min
-
Finding Database TablesLecture12.304 min
-
Extracting Sensitive Data Such As PasswordsLecture12.404 min
-
-
SQL injection Vulnerabilities - Advanced Exploitation 11
-
Discovering & Exploiting Blind SQL InjectionsLecture13.1
-
Discovering Complex SQL Injection VulnerabilitiesLecture13.207 min
-
Exploiting an advanced SQL Injection Vulnerability to Extract PasswordsLecture13.305 min
-
Bypassing FiltersLecture13.405 min
-
Bypassing Security & Accessing All RecordsLecture13.509 min
-
[Security] Quick Fix To Prevent SQL InjectionsLecture13.6
-
Reading & Writing Files On The Server Using SQL InjectionLecture13.706 min
-
Getting A Shell & Controlling The Target Server Using an SQL InjectionLecture13.808 min
-
Discovering SQL Injections & Extracting Data Using SQLmapLecture13.907 min
-
Getting a Direct SQL Shell using SQLmapLecture13.1003 min
-
[Security] – The Right Way To Prevent SQL Injection VulnerabilitiesLecture13.1105 min
-
-
XSS Vulnerabilities 6
-
Introduction – What is XSS or Cross Site Scripting?Lecture14.103 min
-
Discovering Basic Reflected XSSLecture14.204 min
-
Discovering Advanced Reflected XSSLecture14.305 min
-
Discovering An Even More Advanced Reflected XSSLecture14.407 min
-
Discovering Stored XSSLecture14.503 min
-
Discovering Advanced Stored XSSLecture14.604 min
-
-
XSS Vulnerabilities - Exploitation 14
-
Installing Windows As a Virtual MachineLecture15.106 min
-
Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture15.205 min
-
Hooking Victims To BeEF Using Reflected XSSLecture15.306 min
-
Hooking Victims To BeEF Using Stored XSSLecture15.404 min
-
Interacting With Hooked TargetsLecture15.504 min
-
Running Basic Commands On VictimsLecture15.604 min
-
Stealing Credentials/Passwords Using A Fake Login PromptLecture15.702 min
-
Bonus – Installing Veil FrameworkLecture15.804 min
-
Bonus – Veil Overview & Payloads BasicsLecture15.907 min
-
Bonus – Generating An Undetectable Backdoor Using Veil 3Lecture15.1010 min
-
Bonus – Listening For Incoming ConnectionsLecture15.1107 min
-
Bonus – Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10Lecture15.1207 min
-
Gaining Full Control Over Windows TargetLecture15.1304 min
-
[Security] Fixing XSS VulnerabilitiesLecture15.1407 min
-
-
Insecure Session Management 5
-
Logging In As Admin Without a Password By Manipulating CookiesLecture16.106 min
-
Discovering Cross Site Request Forgery Vulnerabilities (CSRF)Lecture16.207 min
-
Exploiting CSRF To Change Admin Password Using a HTML FileLecture16.307 min
-
Exploiting CSRF Vulnerabilities To Change Admin Password Using LinkLecture16.4
-
[Security] The Right Way To Prevent CSRF VulnerabilitiesLecture16.509 min
-
-
Brute Force & Dictionary Attacks 3
-
Introduction to Brute Force & Dictionary Attacks?Lecture17.104 min
-
Creating a WordlistLecture17.207 min
-
Guessing Login Password Using a Wordlist Attack With HydraLecture17.314 min
-
-
Discovering Vulnerabilities Automatically Using Owasp ZAP 2
-
Scanning Target Website For VulnerabilitiesLecture18.104 min
-
Analysing Scan ResultsLecture18.204 min
-
-
Post Exploitation 12
-
Post Exploitation IntroductionLecture19.104 min
-
Executing System Commands On Hacked Web ServersLecture19.207 min
-
Escalating Reverse Shell Access To Weevely ShellLecture19.308 min
-
Weevely Basics – Accessing Other Websites, Running Shell Commands …etcLecture19.407 min
-
Bypassing Limited Privileges & Executing Shell CommandsLecture19.5
-
Downloading Files From Target WebserverLecture19.605 min
-
Uploading Files To Target WebserverLecture19.708 min
-
Getting a Reverse Connection From WeevelyLecture19.808 min
-
Accessing The DatabaseLecture19.909 min
-
ConclusionLecture19.1005 min
-
Writing a Pentest ReportLecture19.1114 min
-
4 Ways to Secure Websites & AppsLecture19.1209 min
-
-
Bonus Section 1
-
Bonus Lecture – What’s Next?Lecture20.1
-
This content is protected, please login and enroll course to view this content!
