Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Ethical Hacking & Reverse Engineering
1. Introduction
1. Introduction (4:04)
2. Registering for an account with defendtheweb.net (1:44)
3. How to use this Guide (3:38)
2. Intro Levels
1. Intro 1 (Client code information leak) (3:28)
2. [NEW] Intro 2 (HTML tag information leak) (3:18)
3. Intro 3 (Javascript code information leak) (10:29)
4. Intro 4 (Path traversal vulnerability) (4:02)
5. Intro 5 (Javascript prompt() function information leak) (2:05)
6. [NEW] Intro 6 (Client code modification vulnerability) (3:50)
7. [NEW] Intro 7 (robots.txt data leak vulnerability) (3:04)
8. Intro 8 (Path traversal vulnerability) (9:41)
9. Intro 9 (Client code modification vulnerability) (3:54)
10. Intro 10 (Javascript code exposure and decryption) (2:52)
11. Intro 11 (File redirection vulnerability) (2:25)
12. Intro 12 (MD5 decryption) (1:31)
3. 24-bit (File extension manipulation exploit)
1. 24-bit (File extension manipulation exploit) (2:49)
4. Word of PeacecraftRealistic (Dumpster diving for emails)
1. World of PeacecraftRealistic (Dumpster diving for emails) (3:47)
5. Secure Agent (Browser Spoofing)
1. Secure Agent (Browser Spoofing) (1:55)
6. Crypt1Crypt (Reverse encryption)
1. Crypt1Crypt (Reverse encryption) (1:45)
7.Beach (Steganography analyis)
1. Beach (Steganography analyis) (3:31)
8. Squashed imageStego (Cracking steganography)
1. Squashed imageStego (Cracking steganography) (1:53)
9. HTTP MethodIntro (HTTP POST exploit & Bypass CSRF-token protection)
9. HTTP MethodIntro (HTTP POST exploit & Bypass CSRF-token protection) (10:34)
10. Library GatewayRealistic (Javascript code exposure vulnerability)
1. Library GatewayRealistic (Javascript code exposure vulnerability) (3:53)
11. SidIntro (Cookie tampering to bypass login)
1. SidIntro (Cookie tampering to bypass login) (2:17)
12. Crypt2Crypt (Cracking Caeser Cipher encryption)
1. Crypt2Crypt (Cracking Caeser Cipher encryption) (2:39)
13. Crypt3Crypt (Decoding Morse Code)
1. [NEW] Crypt3Crypt (Decoding Morse Code) (4:49)
14. SQLi1SQLi (Bypassing login page password using SQL Injection Attack)
1. SQLi1SQLi (Bypassing login page password using SQL Injection Attack) (7:41)
15. Recon (Information gathering skills, including B6-Key)
1. Recon (Information gathering skills, including B6-Keys) (4:33)
16. Crypt4Crypt (Decrypting ciphertext using online decryptors)
1. Crypt4Crypt (Decrypting ciphertext using online decryptors) (2:20)
17.Map It (Portscanning and gaining remote access)
1. Map It (Portscanning and gaining remote access) (4:38)
18. Crypt5Crypt (Reverse & Decrypt ciphertext using online decryptor)
1. Crypt5Crypt (Reversing & Decrypting ciphertext using online decryptors) (3:12)
19. SQLi (Hacking admin username & password using SQL Injection Attack)
1. [NEW] SQLi2SQLi (Hacking admin username & password using SQL Injection Attack) (10:06)
20. Princess SlagRealistic (Directory traversal & null byte attacks)
1. [NEW] Princess SlagRealistic (Directory traversal attack & null byte attacks) (7:34)
21. Xmas '08Realistic (Website defacement attacks)
1. Xmas '08Realistic (Website defacement attacks) (9:48)
22. [new] Planet BidRealistic (Password reminder exploits)
1. Planet BidRealistic (Password reminder exploits) (16:11)
23. Access Logs (Log Injection Attack)
1. Access Logs (Log Injection Attack) (4:31)
24. Sandra Murphy (XML Injection Attack)
1. Sandra Murphy (XML Injection Attack) (4:33)
25. AlphabetizeCoding (Using Javascript to defeat countdown timer)
1ALPHA~1. AlphabetizeCoding (Using Javascript coding to defeat countdown timer) (10:35)
26. AliensStego (Decoding wav files to extract passwords)
1. AliensStego (Decoding wav files to extract passwords) (7:25)
27. Custom EncodingCoding (Decryption & hacking website countdown timer)
1. Custom EncodingCoding (Decryption & hacking website countdown timer) (12:50)
28. [new] Missile codesForensics (Analyze & extract data from disk images)
1. Missile codesForensics (Analyzing and extracting data from disk images) (19:38)
29. Captcha1CAPTCHA (Hacking Captcha using OCR and AutoIt)
1. Introduction to Captcha1 challenge (2:51)
2. Downloading and Installing an OCR software (2:07)
3. Using Abby (OCR tool) to convert image to text (2:43)
4. Download and install AutoIt (Automation tool) (2:42)
5. Using AutoIt (21:02)
30. Captcha2CAPTCHA (Hack Captcha with node.js, imagemagick & AutoIt )
1. Intro to Captcha2 challenge (7:06)
2. Collecting key images (13:39)
3. Splitting the captcha image into 15 sample files (3:21)
4. Installing node.js (2:40)
5. Intro to Node.js (3:46)
6. Using node.js to decode captcha image (10:00)
7. Using AutoIt to defeat countdown timer (10:04)
31. [new] Captcha3CAPTCHA (Using Python to hack Captcha )
1. Introduction to the Captcha3 challenge (3:14)
2. Installing and Using Python (11:36)
3. Installing Pillow library for Python Image Manipulation (7:27)
4. Collecting key images (17:22)
5. Splitting the captcha3 sample using python (2:34)
6. Creating nodejs script to decode captcha sample images (5:07)
7. Using AutoIt to automate tasks and defeat timer limitation (3:54)
32. Introduction to Software Cracking with crackme's
1. Introduction to crackme's (1:56)
33. Introduction to x64dbg and Detect it Easy (DIE)
1. Downloading and installing x64dbg and Detect It Easy (DIE) (5:22)
34. Setting up your cracking workspace and workflow
1. Setting up your cracking workspace and workflow (11:35)
35. Debugger Stepping Basics
1. Debugger Stepping Basics (26:37)
36. Stepping Into Calls
1. Stepping Into Calls (19:23)
37. Breakpoints
1. Breakpoints (6:45)
2. Setting Breakpoints on Strings (10:03)
38. Reversing Jumps
1. Reversing Jumps (9:21)
39. How to patch a program
1. How to patch a program (12:25)
2. Patching with Jumps (7:29)
40. Summary of Cracking Software Workflow
1. The 5 steps of cracking software (4:52)
41. Introduction to cracking gui-based programs
1. Introduction to cracking gui-based programs (4:01)
42. Analyzing the PE for a gui-based program
1. Analyzing the PE for a gui-based program (3:42)
43. Crack the Serial Key using BP on strings
1. Setting up x64dbg (1:35)
2. Crack the Serial Key using BP on strings (8:31)
44. Windows api functions & the stack
1. Window api functions (6:58)
2. Pushing parameters to the stack (6:49)
45. Patching to bypass wrong serial key message
1. Patching to bypass wrong serial key message (11:33)
2. Bypassing using xor assembly (10:14)
46. Bonus Lecture
1. Bonus Lecture (1:47)
Teach online with
2. Setting Breakpoints on Strings
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock