Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Sqlmap Overview
This video provides an overview of the basics of Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-How Hackers Find SQL Injections in Minutes with Sqlmap
This video provides an overview of the section. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-Web Hacker's Toolbox: Tools Used by Successful Hackers
This clip is from the chapter "Introduction to the Course" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section provides an introduction to the course.
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 1
This is the first of the two-part video that demonstrates the actual attack where you would take control of the account with the help of Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - AngularJS: Hacking a Static Template
This video explains the hacking of a static template in AngularJS. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - AngularJS: Going Beyond the $scope
This video will help you go beyond the $scope in AngularJS. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - AngularJS: Template Injection and $scope Hacking – Part 2
This is the second of the two-part video that demonstrates Template Injection and $scope Hacking that uses AngularJS. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through Polyglot File
This video explains bypassing CSP through polyglot file. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through ajax.googleapis.com
This video explains and demonstrates bypassing CSP through ajax.googleapis.com. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 2
This is the second of the two-part video that demonstrates how to be prevented from the account takeover through Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Subdomain Takeover – Part 2
This is the second of the two-part video that recaps what steps you have followed to take the control of the Subdomain. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Subdomain Takeover – Part 1
This is the first of the two-part video that demonstrates the subdomain takeover by attacking the subdomain. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert Full-Stack...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - HTTP Parameter Pollution – Part 2
This is the second of the two-part video that bypasses the authorization and helps you demonstrate the HTTP Parameter Pollution. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - HTTP Parameter Pollution – Part 1
This is the first of the two-part video that talks about the root cause of the problem in the browser where we can use this HTTP Parameter Pollution. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Full-Stack Attacks on Modern Web Applications
This video introduces the section. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".null
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Case Studies of Award-Winning Race Condition Attacks
This video explains some case studies of award-winning race condition attacks. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 2
This video explains exploiting race conditions for case 2. Here, you would be looking at how the hackers re-use one-time discount code. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part2)
This is the first of the two-part video on exploiting race conditions for case 2. Here, you would be looking at how the hackers use another race conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part1)
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how the hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Exploiting Race Conditions in Web Applications
This video introduces the section. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on exploiting race conditions in...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Summary – Hacking AngularJS Applications
This is a summary video on hacking AngularJS applications. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - AngularJS: Template Injection and $scope Hacking – Part 1
This is the first of the two-part video that talks about the theoretical part of Template Injection and $scope Hacking that uses AngularJS. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking AngularJS Applications
This video introduces the section. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS applications.
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 2
This is the second of the two-part video that talks about how to prevent from this attack. This attack is user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...