Instructional Video6:03
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - HTTP Parameter Pollution – Part 1

Higher Ed
This is the first of the two-part video that talks about the root cause of the problem in the browser where we can use this HTTP Parameter Pollution. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Instructional Video1:18
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Full-Stack Attacks on Modern Web Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".null
Instructional Video2:25
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Case Studies of Award-Winning Race Condition Attacks

Higher Ed
This video explains some case studies of award-winning race condition attacks. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section...
Instructional Video10:52
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 2

Higher Ed
This video explains exploiting race conditions for case 2. Here, you would be looking at how the hackers re-use one-time discount code. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web...
Instructional Video8:35
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part2)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 2. Here, you would be looking at how the hackers use another race conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video11:29
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part1)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how the hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video1:55
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Exploiting Race Conditions in Web Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on exploiting race conditions in...
Instructional Video3:05
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Summary – Hacking AngularJS Applications

Higher Ed
This is a summary video on hacking AngularJS applications. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS...
Instructional Video5:06
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - AngularJS: Template Injection and $scope Hacking – Part 1

Higher Ed
This is the first of the two-part video that talks about the theoretical part of Template Injection and $scope Hacking that uses AngularJS. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert...
Instructional Video3:36
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking AngularJS Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS applications.
Instructional Video3:17
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 2

Higher Ed
This is the second of the two-part video that talks about how to prevent from this attack. This attack is user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...
Instructional Video10:29
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 1

Higher Ed
This is the first of the two-part video that talks about how to attack through link. You will work on the user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...
Instructional Video5:49
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - XSS through Image – Part 2

Higher Ed
This is the second of the two-part video that demonstrates the XSS through Image. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video4:09
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - XSS through Image – Part 1

Higher Ed
This is first of the two-part video that talks about the theoretical part as to how to attack the image. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert...
Instructional Video15:49
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 2

Higher Ed
This is the second of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video10:18
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 1

Higher Ed
This is the first of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video1:31
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking Web Applications via PDFs, Images, and Links

Higher Ed
This video introduces the section. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking web...
Instructional Video17:49
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through AngularJS

Higher Ed
This video explains and demonstrates the bypassing of CSP through AngularJS. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video10:43
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through Flash File

Higher Ed
This video demonstrates bypassing CSP through flash file. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section...
Instructional Video1:50
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Bypassing Content Security Policy in Modern Web Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on bypassing Content...
Instructional Video2:04
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction

Higher Ed
This clip is from the chapter "Introduction to the Course" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section introduces the course.
Instructional Video8:38
Curated Video

Modern Espionage: How Your Privacy is Being Compromised

6th - Higher Ed
Discover the surprising ways in which your privacy can be invaded in the modern world. From hidden cameras in everyday objects to sophisticated hacking techniques, learn how spies can access your Smartphone, computer, and even capture...
Instructional Video1:41
The Business Professor

Phishing

Higher Ed
Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
Instructional Video27:57
Neuro Transmissions

The scandal that shook psychology to its core

12th - Higher Ed
In 2011, a scandal broke in psychology that made everyone question whether any of its research could really be believed. For the last decade, psychology has grappled with the aftermath and has tried to understand what went wrong. The...