Curated Video
Sensitive Data Exposure
Sensntive data exposure is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
How to Attack Modern Wireless Networks - Introduction
This video is a general overview on how to attack wireless networks
Curated Video
Setup Your Lab in Kali
In this video, you will learn how to install the necessary tools to setup your safe lab for malware analysis
Curated Video
Create a Malicious Application
This video will teach you how to create an Android malicious application using Kali Linux
Curated Video
Tips to Improve Your Wireless Network Security
This video will teach you some tips on how to protect your network
Curated Video
Metasploitable VM
Metasploitable MV is an intentionaly vulnerable machine by Rapid7, it is made for learning purposes. We will learn how to setup this virtual machine to exploit it in many of the videos in this course
Curated Video
How Can Pentest.ws Help You
Learn how to document your findings for a professional presentation
Curated Video
Insufficient Logging and Monitoring
Insufficient logging and monitoring is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Installing Windows
This video will teach you how to install and setup Windows (The victim's machine)
Curated Video
Discover Vulnerabilities in Websites
In this video, you will learn about various tools used to discover vulberabilities in web applications.
Curated Video
Attack a Router Using Medusa
In this video, you will learn how to run an online password attack on a router using Medusa on KALI. Use this ethically !!!
Curated Video
Why Android
This video will shed the light on the market share of Android and its dominance
Curated Video
Extract APKs From Your Phone
You will learn how to export any Android application that exists on your phone and reverse engineer it in your lab
Curated Video
Intercept_ Analyze_ and Replay Web Traffic
Learn how to leverage the powerful Burp suite in analyzing web traffic and crafting attacks
Curated Video
Different Installation Methods
This video will show you various approaches to setup Kali Linux
Curated Video
Run an Online Password Attack on a Router
Learn how to plan an execute an online password attack on a router
Curated Video
Why KALI
Kali is a powerful pentest box, in this video we will explain the reasons behind its fame
Curated Video
Explore Main Services and Install Necessary Programs
This video will help you get started in setting up your lab
Curated Video
Execute Man-in-the-Middle Attacks
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali
Curated Video
Deface a Website in Few Seconds
Learn how to plan a backdoor and control a website in a minute
Curated Video
Create Your First Trojan and Infiltrate a Target
This video wil show you the baby steps on how to create your first trojan file in Kali Linux. We will put his file into action and start infiltrating data from the victim's machine