- Intro 1
- Lecture1.1
- Preparation - Creating a Penetration Testing Lab 6
- Lecture2.106 min
- Lecture2.209 min
- Lecture2.309 min
- Lecture2.409 min
- Lecture2.511 min
- Lecture2.605 min
- Preparation - Linux Basics 3
- Lecture3.105 min
- Lecture3.213 min
- Lecture3.304 min
- Website Basics 2
- Lecture4.105 min
- Lecture4.206 min
- Information Gathering 9
- Lecture5.105 min
- Lecture5.206 min
- Lecture5.310 min
- Lecture5.404 min
- Lecture5.507 min
- Lecture5.607 min
- Lecture5.704 min
- Lecture5.808 min
- Lecture5.9
- File Upload Vulnerabilities 6
- Lecture6.107 min
- Lecture6.2
- Lecture6.308 min
- Lecture6.4
- Lecture6.507 min
- Lecture6.606 min
- Code Execution Vulnerabilities 3
- Lecture7.107 min
- Lecture7.206 min
- Lecture7.306 min
- Local File Inclusion Vulnerabilities (LFI) 2
- Lecture8.106 min
- Lecture8.207 min
- Remote File Inclusion Vulnerabilities (RFI) 4
- Lecture9.104 min
- Lecture9.206 min
- Lecture9.303 min
- Lecture9.406 min
- SQL Injection Vulnerabilities 2
- Lecture10.106 min
- Lecture10.203 min
- SQL Injection Vulnerabilities - SQLi In Login Pages 4
- Lecture11.108 min
- Lecture11.205 min
- Lecture11.306 min
- Lecture11.408 min
- SQL injection Vulnerabilities - Extracting Data From The Database 4
- Lecture12.107 min
- Lecture12.205 min
- Lecture12.304 min
- Lecture12.404 min
- SQL injection Vulnerabilities - Advanced Exploitation 11
- Lecture13.1
- Lecture13.207 min
- Lecture13.305 min
- Lecture13.405 min
- Lecture13.509 min
- Lecture13.6
- Lecture13.706 min
- Lecture13.808 min
- Lecture13.907 min
- Lecture13.1003 min
- Lecture13.1105 min
- XSS Vulnerabilities 6
- Lecture14.103 min
- Lecture14.204 min
- Lecture14.305 min
- Lecture14.407 min
- Lecture14.503 min
- Lecture14.604 min
- XSS Vulnerabilities - Exploitation 14
- Lecture15.106 min
- Lecture15.205 min
- Lecture15.306 min
- Lecture15.404 min
- Lecture15.504 min
- Lecture15.604 min
- Lecture15.702 min
- Lecture15.804 min
- Lecture15.907 min
- Lecture15.1010 min
- Lecture15.1107 min
- Lecture15.1207 min
- Lecture15.1304 min
- Lecture15.1407 min
- Insecure Session Management 5
- Lecture16.106 min
- Lecture16.207 min
- Lecture16.307 min
- Lecture16.4
- Lecture16.509 min
- Brute Force & Dictionary Attacks 3
- Lecture17.104 min
- Lecture17.207 min
- Lecture17.314 min
- Discovering Vulnerabilities Automatically Using Owasp ZAP 2
- Lecture18.104 min
- Lecture18.204 min
- Post Exploitation 12
- Lecture19.104 min
- Lecture19.207 min
- Lecture19.308 min
- Lecture19.407 min
- Lecture19.5
- Lecture19.605 min
- Lecture19.708 min
- Lecture19.808 min
- Lecture19.909 min
- Lecture19.1005 min
- Lecture19.1114 min
- Lecture19.1209 min
- Bonus Section 1
- Lecture20.1
Maltego – Discovering Websites, Hosting Provider & Emails
In this lecture we will dive deeper into Maltego, you will learn how to discover more info about the target such as admin’s email, hosting company, servers and lay out this information nicely.