Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Websites & Applications Penetration Testing
1. Introduction
1. Introduction (3:19)
2. Teaser II Application Hacking (0:50)
3. Registration Process (3:13)
2. Basic Challenges Cookie, HTML code tampering
1. HTML comments (1:55)
3. Basic 1 HTML hidden comments (7:17)
4. GETPOST methods (7:31)
5. Basic 2 PHP code vulnerability (8:19)
6. Basic 3 Hidden input type vulnerability (7:43)
7. Basic 4 HTML code tampering (7:49)
8. Basic 5 Exploiting HTML code send email password (4:25)
3. Cryptographic Basic Challenges
1. Introduction to Cryptography (4:33)
2. Introduction to the Caeser Cipher (7:34)
3. Basic 6 Learn about cryptographic encryption (12:45)
4. Basic 6 Steps of Encryption and Decryption (9:17)
5. Basic 6 Solution (6:30)
4. Basic Challenges Command injection, Directory traversal vulnerability
1. Basic 7 Linux command injection attacks (9:10)
2. Basic 8 Remote Server Side Include (SSI) injection (9:57)
3. Basic 9 Remote Directory Traversal Vulnerability (9:54)
4. Basic 10 Cookie Tampering method (10:31)
5. Realistic Challenge Modify HTML tags value
1. Introduction to the Realistic Challenges (1:40)
2. Realistic challenge 1 Introduction and hints (5:29)
3. Realistic challenge 1 Solution (6:10)
6. Realistic Challenge SQL injection attacks
1. Realistic Challenge 2 Introduction and hints (7:37)
2. Realistic Challenge 2 Solution (2:11)
7. Realistic Challenge Server side Vulnerability
1. Realistic Challenge 3 Introduction and hints (8:04)
2. Realistic Challenge 3 Solution (12:42)
8. Realistic Challenge SQL injection to hack email lists
1. Realistic Challenge 4 Introduction and Hints (10:44)
2. Realistic Challenge 4 Counting total columns using ORDER BY (11:38)
3. Realistic Challenge 4 Union command to select all columns (11:42)
4. Realistic Challenge 4 Solution (5:33)
9. Realistic Challenge Hack Admin Password
1. Realistic Challenge 5 Hack admin password using directory traversal (16:09)
2. Realistic Challenge 5 Advance technique to find algorithm (10:02)
10. Realistic Challenge Cryptanalysis
1. Realistic Challenge 6 Introduction and hints (3:19)
2. Realistic Challenge 6 How algorithm works (17:57)
11. Realistic Challenge Apache vulnerability (John the Ripper)
1. Realistic Challenge 7 Parameter's value modification (8:14)
2. Realistic Challenge 7 Directory Traversal (9:56)
3. Realistic Challenge 7 htpasswd file (Apache stuffs) (5:54)
4. Realistic Challenge 7 Crack password using John the Ripper (11:05)
12. Realistic Challenge Hack Bank Accounts
1. Realistic Challenge 8 Introduction and Hints (4:35)
2. Realistic Challenge 8 SQL injection (8:56)
3. Realistic Challenge 8 Cookie Tampering (4:11)
4. Realistic Challenge 8 Clear Logs (7:29)
13. Realistic Challenge Cross Site Scripting Attacks (XSS)
1. Realistic Challenge 9 Introduction and Hints (8:58)
2. Realistic Challenge 9 Apply XSS payloads (10:21)
3. Realistic Challenge 9 Clear Logs or Traces (9:25)
14. Realistic Challenge Exploiting Forms to change School Grades--Programmers Dream
1. Realistic Challenge 10 Introduction and Hints (5:57)
2. Realistic Challenge 10 Hack Admin Credentials (11:16)
3. Realistic Challenge 10 Spoof Web browser (2:03)
4. Realistic Challenge 10 Be admin using cookie tampering methods (5:24)
5. Realistic Challenge 10 Exploit form actions (14:44)
15. Application Hacking
1. Decompiler vs Debugger (7:50)
2. Shortcuts for x64dbg (1:43)
3. Steps for application Hacking (7:17)
4. Application Hacking 1 Using tools to crack serial number of application (13:00)
16. Application Hacking Using WireShark
2. Application Hacking 2 Solution using WireShark (13:13)
1. Application Hacking 2 Introduction and Hints (3:38)
17. Application Challenge Using x64dbg tool (Debugger)
1. Application Challenge 5 Using x64dbg (11:48)
2. Application Challenge 5 Search string references (1:01)
3. Application Challenge 5 Analyze control compare statement to grab password (6:24)
4. Application Challenge 5 Update registers to get complete password (13:56)
18. Application Challenge Hack application using x64dbg tool
1. Application Challenge 6 Using x64dbg (10:37)
2. Application Challenge 6 Analyze compare commands (13:58)
3. Application Challenge 6 Analyze dump to grab password (8:55)
Teach online with
4. Application Hacking 1 Using tools to crack serial number of application
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock