-
Intro 1
-
Lecture1.1
-
-
Preparation - Creating a Penetration Testing Lab 4
-
Lecture2.1
-
Lecture2.2
-
Lecture2.3
-
Lecture2.4
-
-
Preparation - Linux Basics 3
-
Lecture3.1
-
Lecture3.2
-
Lecture3.3
-
-
Website Basics 2
-
Lecture4.1
-
Lecture4.2
-
-
Information Gathering 9
-
Lecture5.1
-
Lecture5.2
-
Lecture5.3
-
Lecture5.4
-
Lecture5.5
-
Lecture5.6
-
Lecture5.7
-
Lecture5.8
-
Lecture5.9
-
-
File Upload Vulnerabilities 6
-
Lecture6.1
-
Lecture6.2
-
Lecture6.3
-
Lecture6.4
-
Lecture6.5
-
Lecture6.6
-
-
Code Execution Vulnerabilities 3
-
Lecture7.1
-
Lecture7.2
-
Lecture7.3
-
-
Local File Inclusion Vulnerabilities (LFI) 3
-
Lecture8.1
-
Lecture8.2
-
Lecture8.3
-
-
Remote File Inclusion Vulnerabilities (RFI) 4
-
Lecture9.1
-
Lecture9.2
-
Lecture9.3
-
Lecture9.4
-
-
SQL Injection Vulnerabilities 2
-
Lecture10.1
-
Lecture10.2
-
-
SQL Injection Vulnerabilities - SQLi In Login Pages 4
-
Lecture11.1
-
Lecture11.2
-
Lecture11.3
-
Lecture11.4
-
-
SQL injection Vulnerabilities - Extracting Data From The Database 4
-
Lecture12.1
-
Lecture12.2
-
Lecture12.3
-
Lecture12.4
-
-
SQL injection Vulnerabilities - Advanced Exploitation 11
-
Lecture13.1
-
Lecture13.2
-
Lecture13.3
-
Lecture13.4
-
Lecture13.5
-
Lecture13.6
-
Lecture13.7
-
Lecture13.8
-
Lecture13.9
-
Lecture13.10
-
Lecture13.11
-
-
XSS Vulnerabilities 6
-
Lecture14.1
-
Lecture14.2
-
Lecture14.3
-
Lecture14.4
-
Lecture14.5
-
Lecture14.6
-
-
XSS Vulnerabilities - Exploitation 12
-
Lecture15.1
-
Lecture15.2
-
Lecture15.3
-
Lecture15.4
-
Lecture15.5
-
Lecture15.6
-
Lecture15.7
-
Lecture15.8
-
Lecture15.9
-
Lecture15.10
-
Lecture15.11
-
Lecture15.12
-
-
Insecure Session Management 5
-
Lecture16.1
-
Lecture16.2
-
Lecture16.3
-
Lecture16.4
-
Lecture16.5
-
-
Brute Force & Dictionary Attacks 3
-
Lecture17.1
-
Lecture17.2
-
Lecture17.3
-
-
Discovering Vulnerabilities Automatically Using Owasp ZAP 2
-
Lecture18.1
-
Lecture18.2
-
-
Post Exploitation 9
-
Lecture19.1
-
Lecture19.2
-
Lecture19.3
-
Lecture19.4
-
Lecture19.5
-
Lecture19.6
-
Lecture19.7
-
Lecture19.8
-
Lecture19.9
-
-
Bonus Section 1
-
Lecture20.1
-
Post Exploitation Introduction
In this lecture we will talk about what you will learn in this section and show you where we will start from.
Resources: