Curriculum
Course:
Advanced Web Hacking & Penetration T...
Login
Curriculum
Advanced Web Hacking & Penetration Testing Masterclass
1. Preparation - Creating a Penetration Testing Lab
0/3
1. Jinsi ya Kuinstall VirtualBox katika Windows (Install VirtualBox on Windows) – Hacking Lab Setup
4 min & 31 sec.
Preview
2. Jinsi ya Kuinstall Metasploitable kwenye VirtualBox – Hacking Lab Setup
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
8 min & 47 sec.
3. Configuring Metasploitable Database For Hacking | SomaTaaluma
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
4 min & 17 sec
2. Preparation - Linux Basics
0/2
1. Kali Linux Overview
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
10 min & 34 sec
Preview
2. Top 53 Linux Basic Commands
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
40 min & 11 sec.
3. Information Gathering
0/7
1. Information Gathering Section Introduction
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
2 min & 37 sec
2. Who Is Lookup [Gathering Information About Our Target]
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
6 min & 3 sec
3. Discovering Technologies Used On The Website
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
5 min & 34 sec
4. Discovering Other Websites Hosted In The Same Server
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
3 min & 25 sec
5. Finding Subdomains Of Our Target Website
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
3 min & 59 sec
6. Discovering Sensitive Files
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
3 min & 33 sec
7. Analyzing Scan Results
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
7 min & 3 sec
4. File Upload Vulnerabilities
0/7
1. File Upload Vulnerability Section Introduction
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
1 min & 54 sec
2. How to Discover & Exploit Basic FIle Upload VUlnerabilities To Hack Website
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
11 min & 59 sec
3. HTTP Request, GET & POST
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
4 min & 24 sec
4. Intercepting HTTP Request
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
6 min & 57 sec
5. Exploiting Advanced File Upload Vulnerability To Hack Website And Systems
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
9 min & 17 sec
6. Exploiting More Advanced File Upload Vulnerabiities
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
5 min & 20 sec
7. SECURITY: Fixing File Upload Vulnerability
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
8 min & 1 sec
5. Code Execution Vulnerabilities
0/4
1. Code Execution Vulnerability Section Introduction
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
49 sec
2. How To Discover & Exploit Basic Code Execution Vulnerability To Hack Website & System
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
7 min & 48 sec
3. Exploiting Advanced Code Execution Vulnerability To Hack Website& Systems
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
5 min & 54 sec
4. SECURITY: Fixing Code Execution Vulnerability
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
3 min & 1 sec
6. Local File Inclusion Vulnerabilities (LFI)
0/4
1. Introduction To Section Of Local File Inclusion Vulnerability (LFI)
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
45 sec
2. What Are They Local File Inclusion Vulnerability (LFI) And How To Discover And Exploit Them
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
4 min & 17 sec
3. Gaining Shell Access From (LFI) Vulnerability Method 1
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
7 min & 29 sec
4. Gaining Shell Access From LFI Vulnerabilities - Method 2
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
7. Remote File Inclusion Vulnerabilities (RFI)
0/5
1. Remote File Inclusion Vulnerabilities Section Introduction
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
2. Remote File Inclusion Vulnerabilities - Configuring PHP Settings
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
3. Remote File Inclusion Vulnerabilities - Discovery & Exploitation
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
4. Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
5. SECURITY: Fixing File Inclusion Vulnerabilities
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
8. SQL Injection Vulnerabilities
0/2
1. What is SQL
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
2. Dangers of SQL Injections
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
9. SQL Injection Vulnerabilities - SQLi in Login Pages
0/4
1. Discovering SQL Injections In POST
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
2. Bypassing Logins Using SQL Injection Vulnerability
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
3. Bypassing More Secure Logins Using SQL Injections
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
4.SECURITY: Preventing SQL Injections In Login Pages
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
10. SQL Injection Vulnerabilities - Extracting Data From The Database
0/4
1. Discovering SQL Injections in GET
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
2. Reading Database Information
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
3. Finding Database Tables
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
4. Extracting Sensitive Data Such As Passwords
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
11. SQL Injection Vulnerabilities - Advanced Exploitation
0/11
1. Discovering & Exploiting Blind SQL Injections
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
2. Discovering Complex SQL Injection Vulnerabilities
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
3. Exploiting an advanced SQL Injection Vulnerability to Extract Passwords
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
4. Bypassing Filters
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
5. Bypassing Security & Accessing All Records
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
6. SECURITY: Quick Fix To Prevent SQL Injections
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
7. Reading & Writing Files On The Server Using SQL Injections
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
8. Getting A Shell & Controlling The Target Server Using an SQL Injection
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
9. Discovering SQL Injections & Extracting Data Using SQLmap
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
10. Getting a Direct SQL Shell using SQLmap
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
11. SECURITY: The Right Way To Prevent SQL Injection Vulnerabilites
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
12. XSS Vulnerabilities
0/6
1. Introduction - What is XSS or Cross Site Scripting
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
2. Discovering Basic Reflected XSS
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
3. Discovering Advanced Reflected XSS
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
4. Discovering An Even More Advanced Reflected XSS
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
5. Discovering Stored XSS
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
6. Discovering Advanced Stored XSS
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
13. XSS Vulnerabilities - Exploitation
0/6
1. Hooking Victims To BeEF Using Reflected XSS
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
2. Hooking Victims To BeEF Using Stored XSS
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
3. Interacting With Hooked Targets
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
4. Running Basic Commands On Victims
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
5. Stealing CredentialsPasswords Using A Fake Login Prompt
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
6. SECURITY : Fixing XSS Vulnerabilities
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
14. Insecure Session Management
0/5
1. Logging In As Admin Without a Password By Manipulating Cookies
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
2. Discovering Cross Site Request Forgery Vulnerabilities (CSRF)
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
3. Exploiting CSRF To Change Admin Password Using a HTML File
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
4. Exploiting CSRF Vulnerabilities To Change Admin Password Using Link
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
5. SECURITY: The Right Way To Prevent CSRF Vulnerabilities
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
15. Brute Force & Dictionary Attacks
0/3
1. Introduction to Brute Force & Dictionary Attacks
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
2. Creating a Wordlist
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
3. Guessing Login Password Using a Wordlist Attack With Hydra
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
16. Discovering Vulnerabilities Automatically
0/2
1. Scanning Target Website For Vulnerabilities
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
2. Analysing Scan Results
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
17. Post Exploitation
0/9
1. Post Exploitation Introduction
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
2. Executing System Commands On Hacked Web Servers
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
3. Escalating Reverse Shell Access To Weevely Shell
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
4. Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
5. Bypassing Limited Privileges & Executing Shell Commands
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
6. Downloading Files From Target Webserver
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
7. Uploading Files To Target Webserver
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
8. Getting a Reverse Connection From Weevely
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
9. Accessing The Database
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
18. Conclusion
0/1
CONGRATULATIONS, What Next?
This lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Video lesson
Sign In
The password must have a minimum of 8 characters of numbers and letters, contain at least 1 capital letter
Delete file
Are you sure you want to delete this file?
Cancel
Delete
Remember me
Sign In
Sign Up
Restore password
Send reset link
Password reset link sent
to your email
Close
Confirmation link sent
Please follow the instructions sent to your email address
Close
Your application is sent
We'll send you an email as soon as your application is approved.
Go to Profile
No account?
Sign Up
Sign In
Sign up
as instructor
Lost Password?
error:
Protected