Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - HTTP Parameter Pollution – Part 1
This is the first of the two-part video that talks about the root cause of the problem in the browser where we can use this HTTP Parameter Pollution. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Full-Stack Attacks on Modern Web Applications
This video introduces the section. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".null
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Case Studies of Award-Winning Race Condition Attacks
This video explains some case studies of award-winning race condition attacks. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 2
This video explains exploiting race conditions for case 2. Here, you would be looking at how the hackers re-use one-time discount code. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part2)
This is the first of the two-part video on exploiting race conditions for case 2. Here, you would be looking at how the hackers use another race conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part1)
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how the hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Exploiting Race Conditions in Web Applications
This video introduces the section. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on exploiting race conditions in...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Summary – Hacking AngularJS Applications
This is a summary video on hacking AngularJS applications. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - AngularJS: Template Injection and $scope Hacking – Part 1
This is the first of the two-part video that talks about the theoretical part of Template Injection and $scope Hacking that uses AngularJS. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking AngularJS Applications
This video introduces the section. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS applications.
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 2
This is the second of the two-part video that talks about how to prevent from this attack. This attack is user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 1
This is the first of the two-part video that talks about how to attack through link. You will work on the user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - XSS through Image – Part 2
This is the second of the two-part video that demonstrates the XSS through Image. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - XSS through Image – Part 1
This is first of the two-part video that talks about the theoretical part as to how to attack the image. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 2
This is the second of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 1
This is the first of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking Web Applications via PDFs, Images, and Links
This video introduces the section. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking web...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through AngularJS
This video explains and demonstrates the bypassing of CSP through AngularJS. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through Flash File
This video demonstrates bypassing CSP through flash file. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Bypassing Content Security Policy in Modern Web Applications
This video introduces the section. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on bypassing Content...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction
This clip is from the chapter "Introduction to the Course" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section introduces the course.
Curated Video
Modern Espionage: How Your Privacy is Being Compromised
Discover the surprising ways in which your privacy can be invaded in the modern world. From hidden cameras in everyday objects to sophisticated hacking techniques, learn how spies can access your Smartphone, computer, and even capture...
The Business Professor
Phishing
Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
Neuro Transmissions
The scandal that shook psychology to its core
In 2011, a scandal broke in psychology that made everyone question whether any of its research could really be believed. For the last decade, psychology has grappled with the aftermath and has tried to understand what went wrong. The...