About This Course
Course Curriculum
-
Course Introduction
00:02:00
-
Lab Overview & Needed Software
00:08:00 -
Installing Kali 2019 As a Virtual Machine Using a Ready Image
00:10:00 -
Installing Kali 2019 As a Virtual Machine
00:10:00 -
Installing Metasploitable As a Virtual Machine
00:04:00
-
Basic Overview of Kali Linux
00:05:00 -
The Linux Terminal & Basic Linux Commands
00:11:00 -
Configuring Metasploitable & Lab Network Settings
00:06:00
-
What is a Website?
00:04:00 -
How To Hack a Website?
00:04:00
-
Gathering Information Using Whois Lookup
00:05:00 -
Discovering Technologies Used On The Website
00:06:00 -
Gathering Comprehensive DNS Information
00:10:00 -
Discovering Websites On The Same Server
00:04:00 -
Discovering Subdomains
00:05:00 -
Discovering Sensitive Files
00:07:00 -
Analysing Discovered Files
00:04:00 -
Maltego – Discovering Servers, Domains & Files
00:08:00 -
Maltego – Discovering Websites, Hosting Provider & Emails
00:05:00
-
What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities
00:07:00 -
HTTP Requests – GET & POST
00:04:00 -
Intercepting HTTP Requests
00:07:00 -
Exploiting Advanced File Upload Vulnerabilities
00:05:00 -
Exploiting More Advanced File Upload Vulnerabilities
00:04:00 -
[Security] Fixing File Upload Vulnerabilities
00:06:00
-
What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities
00:07:00 -
Exploiting Advanced Code Execution Vulnerabilities
00:06:00 -
[Security] – Fixing Code Execution Vulnerabilities
00:06:00
-
What are they? And How To Discover & Exploit Them
00:06:00 -
Gaining Shell Access From LFI Vulnerabilities – Method 1
00:07:00 -
Gaining Shell Access From LFI Vulnerabilities – Method 2
00:11:00
-
Remote File Inclusion Vulnerabilities – Configuring PHP Settings
00:04:00 -
Remote File Inclusion Vulnerabilities – Discovery & Exploitation
00:06:00 -
Exploiting Advanced Remote File Inclusion Vulnerabilities
00:03:00 -
[Security] Fixing File Inclusion Vulnerabilities
00:06:00
-
What is SQL
00:06:00 -
Dangers of SQL Injections
00:03:00
-
Discovering SQL Injections In POST
00:08:00 -
Bypassing Logins Using SQL Injection Vulnerability
00:05:00 -
Bypassing More Secure Logins Using SQL Injections
00:06:00 -
[Security] Preventing SQL Injections In Login Pages
00:08:00
-
Discovering SQL Injections in GET
00:07:00 -
Reading Database Information
00:05:00 -
Finding Database Tables
00:04:00 -
Extracting Sensitive Data Such As Passwords
00:04:00
-
Discovering & Exploiting Blind SQL Injections
00:06:00 -
Discovering a More Complicated SQL Injection
00:07:00 -
Extracting Data (passwords) By Exploiting a More Difficult SQL Injection
00:05:00 -
Bypassing Filters
00:05:00 -
Bypassing Security & Accessing All Records
00:09:00 -
[Security] Quick Fix To Prevent SQL Injections
00:07:00 -
Reading & Writing Files On The Server Using SQL Injection Vulnerability
00:06:00 -
Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server
00:08:00 -
Discovering SQL Injections & Extracting Data Using SQLmap
00:07:00 -
[Security] – The Right Way To Prevent SQL Injection
00:05:00
-
Introduction – What is XSS or Cross Site Scripting?
00:03:00 -
Discovering Basic Reflected XSS
00:04:00 -
Discovering Advanced Reflected XSS
00:05:00 -
Discovering An Even More Advanced Reflected XSS
00:07:00 -
Discovering Stored XSS
00:03:00 -
Discovering Advanced Stored XSS
00:04:00
-
Hooking Victims To BeEF Using Reflected XSS
00:06:00 -
Hooking Victims To BeEF Using Stored XSS
00:04:00 -
BeEF – Interacting With Hooked Victims
00:04:00 -
BeEF – Running Basic Commands On Victims
00:04:00 -
BeEF – Stealing Credentials/Passwords Using A Fake Login Prompt
00:02:00 -
Bonus – Installing Veil 3.1
00:06:00 -
Bonus – Veil Overview & Payloads Basics
00:07:00 -
Bonus – Generating An Undetectable Backdoor Using Veil 3
00:10:00 -
Bonus – Listening For Incoming Connections
00:07:00 -
Bonus – Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10
00:07:00 -
BeEF – Gaining Full Control Over Windows Target
00:04:00 -
[Security] Fixing XSS Vulnerabilities
00:07:00
-
Logging In As Admin Without a Password By Manipulating Cookies
00:06:00 -
Discovering Cross Site Request Forgery Vulnerabilities (CSRF)
00:07:00 -
Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File
00:07:00 -
Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview)
00:06:00 -
[Security] The Right Way To Prevent CSRF Vulnerabilities
00:09:00
-
What Are Brute Force & Dictionary Attacks?
00:04:00 -
Creating a Wordlist
00:07:00 -
Launching a Wordlist Attack & Guessing Login Password Using Hydra
00:14:00
-
Scanning Target Website For Vulnerabilities
00:04:00 -
Analysing Scan Results
00:04:00
-
Post Exploitation Introduction
00:04:00 -
Interacting With The Reverse Shell Access Obtained In Previous Lectures
00:07:00 -
Escalating Reverse Shell Access To Weevely Shell
00:08:00 -
Weevely Basics – Accessing Other Websites, Running Shell Commands …etc
00:07:00 -
Bypassing Limited Privileges & Executing Shell Commands
00:05:00 -
Downloading Files From Target Webserver
00:05:00 -
Uploading Files To Target Webserver
00:08:00 -
Getting a Reverse Connection From Weevely
00:08:00 -
Accessing The Database
00:09:00