- Intro 1
- Course IntroductionLecture1.1
 
 - Preparation - Creating a Penetration Testing Lab 6
- Lab Overview & Needed SoftwareLecture2.106 min
 - Initial PreparationLecture2.209 min
 - Installing Kali Linux as a VM on WindowsLecture2.309 min
 - Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture2.409 min
 - Installing Kali Linux as a VM on LinuxLecture2.511 min
 - Installing Metasploitable As a Virtual MachineLecture2.605 min
 
 - Preparation - Linux Basics 4
- Basic Overview Of Kali LinuxLecture3.105 min
 - The Linux Terminal & Basic Linux CommandsLecture3.210 min
 - More Powerful Linux Terminals with AI FeaturesLecture3.305 min
 - Configuring Metasploitable & Lab Network SettingsLecture3.404 min
 
 - Website Basics 2
- What Is a Website?Lecture4.105 min
 - How To Hack a Website?Lecture4.206 min
 
 - Information Gathering 9
- Gathering Information Using Whois LookupLecture5.105 min
 - Discovering Technologies Used On The WebsiteLecture5.206 min
 - Gathering Comprehensive DNS InformationLecture5.310 min
 - Discovering Websites On The Same ServerLecture5.404 min
 - Discovering SubdomainsLecture5.507 min
 - Discovering Sensitive FilesLecture5.607 min
 - Analyzing Discovered FilesLecture5.704 min
 - Maltego – Discovering Servers, Domains & FilesLecture5.808 min
 - Maltego – Discovering Websites, Hosting Provider & EmailsLecture5.9
 
 - File Upload Vulnerabilities 6
- How To Discover & Exploit Basic File Upload Vulnerabilities to Hack WebsitesLecture6.107 min
 - GET & POST RequestsLecture6.2
 - Intercepting RequestsLecture6.308 min
 - Exploiting Advanced File Upload Vulnerabilities To Hack WebsitesLecture6.4
 - Exploiting More Advanced File Upload VulnerabilitiesLecture6.507 min
 - [Security] Fixing File Upload VulnerabilitiesLecture6.606 min
 
 - Code Execution Vulnerabilities 3
- How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack WebsitesLecture7.107 min
 - Exploiting Advanced Code Execution VulnerabilitiesLecture7.206 min
 - [Security] – Fixing Code Execution VulnerabilitiesLecture7.306 min
 
 - Local File Inclusion Vulnerabilities (LFI) 2
- What are they? And How To Discover & Exploit ThemLecture8.106 min
 - Gaining Shell Access From LFI VulnerabilitiesLecture8.207 min
 
 - Remote File Inclusion Vulnerabilities (RFI) 4
- Remote File Inclusion Vulnerabilities – Configuring PHP SettingsLecture9.104 min
 - Remote File Inclusion Vulnerabilities – Discovery & ExploitationLecture9.206 min
 - Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack WebsitesLecture9.303 min
 - [Security] Fixing File Inclusion VulnerabilitiesLecture9.406 min
 
 - SQL Injection Vulnerabilities 2
- What is SQL?Lecture10.106 min
 - Dangers of SQL InjectionsLecture10.203 min
 
 - SQL Injection Vulnerabilities - SQLi In Login Pages 4
- Discovering SQL Injections In POSTLecture11.108 min
 - Bypassing Logins Using SQL Injection VulnerabilityLecture11.205 min
 - Bypassing More Secure Logins Using SQL InjectionsLecture11.306 min
 - [Security] Preventing SQL Injections In Login PagesLecture11.408 min
 
 - SQL injection Vulnerabilities - Extracting Data From The Database 4
- Discovering SQL Injections in GETLecture12.107 min
 - Reading Database InformationLecture12.205 min
 - Finding Database TablesLecture12.304 min
 - Extracting Sensitive Data Such As PasswordsLecture12.404 min
 
 - SQL injection Vulnerabilities - Advanced Exploitation 11
- Discovering & Exploiting Blind SQL InjectionsLecture13.1
 - Discovering Complex SQL Injection VulnerabilitiesLecture13.207 min
 - Exploiting an advanced SQL Injection Vulnerability to Extract PasswordsLecture13.305 min
 - Bypassing FiltersLecture13.405 min
 - Bypassing Security & Accessing All RecordsLecture13.509 min
 - [Security] Quick Fix To Prevent SQL InjectionsLecture13.6
 - Reading & Writing Files On The Server Using SQL InjectionLecture13.706 min
 - Getting A Shell & Controlling The Target Server Using an SQL InjectionLecture13.808 min
 - Discovering SQL Injections & Extracting Data Using SQLmapLecture13.907 min
 - Getting a Direct SQL Shell using SQLmapLecture13.1003 min
 - [Security] – The Right Way To Prevent SQL Injection VulnerabilitiesLecture13.1105 min
 
 - XSS Vulnerabilities 6
- Introduction – What is XSS or Cross Site Scripting?Lecture14.103 min
 - Discovering Basic Reflected XSSLecture14.204 min
 - Discovering Advanced Reflected XSSLecture14.305 min
 - Discovering An Even More Advanced Reflected XSSLecture14.407 min
 - Discovering Stored XSSLecture14.503 min
 - Discovering Advanced Stored XSSLecture14.604 min
 
 - XSS Vulnerabilities - Exploitation 14
- Installing Windows As a Virtual MachineLecture15.106 min
 - Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture15.205 min
 - Hooking Victims To BeEF Using Reflected XSSLecture15.306 min
 - Hooking Victims To BeEF Using Stored XSSLecture15.404 min
 - Interacting With Hooked TargetsLecture15.504 min
 - Running Basic Commands On VictimsLecture15.604 min
 - Stealing Credentials/Passwords Using A Fake Login PromptLecture15.702 min
 - Bonus – Installing Veil FrameworkLecture15.804 min
 - Bonus – Veil Overview & Payloads BasicsLecture15.907 min
 - Bonus – Generating An Undetectable Backdoor Using Veil 3Lecture15.1010 min
 - Bonus – Listening For Incoming ConnectionsLecture15.1107 min
 - Bonus – Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10Lecture15.1207 min
 - Gaining Full Control Over Windows TargetLecture15.1304 min
 - [Security] Fixing XSS VulnerabilitiesLecture15.1407 min
 
 - Insecure Session Management 5
- Logging In As Admin Without a Password By Manipulating CookiesLecture16.106 min
 - Discovering Cross Site Request Forgery Vulnerabilities (CSRF)Lecture16.207 min
 - Exploiting CSRF To Change Admin Password Using a HTML FileLecture16.307 min
 - Exploiting CSRF Vulnerabilities To Change Admin Password Using LinkLecture16.4
 - [Security] The Right Way To Prevent CSRF VulnerabilitiesLecture16.509 min
 
 - Brute Force & Dictionary Attacks 3
- Introduction to Brute Force & Dictionary Attacks?Lecture17.104 min
 - Creating a WordlistLecture17.207 min
 - Guessing Login Password Using a Wordlist Attack With HydraLecture17.314 min
 
 - Discovering Vulnerabilities Automatically Using Owasp ZAP 2
- Scanning Target Website For VulnerabilitiesLecture18.104 min
 - Analysing Scan ResultsLecture18.204 min
 
 - Post Exploitation 12
- Post Exploitation IntroductionLecture19.104 min
 - Executing System Commands On Hacked Web ServersLecture19.207 min
 - Escalating Reverse Shell Access To Weevely ShellLecture19.308 min
 - Weevely Basics – Accessing Other Websites, Running Shell Commands …etcLecture19.407 min
 - Bypassing Limited Privileges & Executing Shell CommandsLecture19.5
 - Downloading Files From Target WebserverLecture19.605 min
 - Uploading Files To Target WebserverLecture19.708 min
 - Getting a Reverse Connection From WeevelyLecture19.808 min
 - Accessing The DatabaseLecture19.909 min
 - ConclusionLecture19.1005 min
 - Writing a Pentest ReportLecture19.1114 min
 - 4 Ways to Secure Websites & AppsLecture19.1209 min
 
 - Bonus Section 1
- Bonus Lecture – What’s Next?Lecture20.1
 
 
This content is protected, please login and enroll course to view this content!
