-
Intro 1
-
Lecture1.1
-
-
Preparation - Creating a Penetration Testing Lab 4
-
Lecture2.1
-
Lecture2.2
-
Lecture2.3
-
Lecture2.4
-
-
Preparation - Linux Basics 3
-
Lecture3.1
-
Lecture3.2
-
Lecture3.3
-
-
Website Basics 2
-
Lecture4.1
-
Lecture4.2
-
-
Information Gathering 9
-
Lecture5.1
-
Lecture5.2
-
Lecture5.3
-
Lecture5.4
-
Lecture5.5
-
Lecture5.6
-
Lecture5.7
-
Lecture5.8
-
Lecture5.9
-
-
File Upload Vulnerabilities 6
-
Lecture6.1
-
Lecture6.2
-
Lecture6.3
-
Lecture6.4
-
Lecture6.5
-
Lecture6.6
-
-
Code Execution Vulnerabilities 3
-
Lecture7.1
-
Lecture7.2
-
Lecture7.3
-
-
Local File Inclusion Vulnerabilities (LFI) 3
-
Lecture8.1
-
Lecture8.2
-
Lecture8.3
-
-
Remote File Inclusion Vulnerabilities (RFI) 4
-
Lecture9.1
-
Lecture9.2
-
Lecture9.3
-
Lecture9.4
-
-
SQL Injection Vulnerabilities 2
-
Lecture10.1
-
Lecture10.2
-
-
SQL Injection Vulnerabilities - SQLi In Login Pages 4
-
Lecture11.1
-
Lecture11.2
-
Lecture11.3
-
Lecture11.4
-
-
SQL injection Vulnerabilities - Extracting Data From The Database 4
-
Lecture12.1
-
Lecture12.2
-
Lecture12.3
-
Lecture12.4
-
-
SQL injection Vulnerabilities - Advanced Exploitation 11
-
Lecture13.1
-
Lecture13.2
-
Lecture13.3
-
Lecture13.4
-
Lecture13.5
-
Lecture13.6
-
Lecture13.7
-
Lecture13.8
-
Lecture13.9
-
Lecture13.10
-
Lecture13.11
-
-
XSS Vulnerabilities 6
-
Lecture14.1
-
Lecture14.2
-
Lecture14.3
-
Lecture14.4
-
Lecture14.5
-
Lecture14.6
-
-
XSS Vulnerabilities - Exploitation 12
-
Lecture15.1
-
Lecture15.2
-
Lecture15.3
-
Lecture15.4
-
Lecture15.5
-
Lecture15.6
-
Lecture15.7
-
Lecture15.8
-
Lecture15.9
-
Lecture15.10
-
Lecture15.11
-
Lecture15.12
-
-
Insecure Session Management 5
-
Lecture16.1
-
Lecture16.2
-
Lecture16.3
-
Lecture16.4
-
Lecture16.5
-
-
Brute Force & Dictionary Attacks 3
-
Lecture17.1
-
Lecture17.2
-
Lecture17.3
-
-
Discovering Vulnerabilities Automatically Using Owasp ZAP 2
-
Lecture18.1
-
Lecture18.2
-
-
Post Exploitation 9
-
Lecture19.1
-
Lecture19.2
-
Lecture19.3
-
Lecture19.4
-
Lecture19.5
-
Lecture19.6
-
Lecture19.7
-
Lecture19.8
-
Lecture19.9
-
-
Bonus Section 1
-
Lecture20.1
-
Maltego – Discovering Websites, Hosting Provider & Emails
In this lecture we will dive deeper into Maltego, you will learn how to discover more info about the target such as admin’s email, hosting company, servers and lay out this information nicely.