Curated Video
Metasploitable VM
Metasploitable MV is an intentionaly vulnerable machine by Rapid7, it is made for learning purposes. We will learn how to setup this virtual machine to exploit it in many of the videos in this course
Curated Video
How Can Pentest.ws Help You
Learn how to document your findings for a professional presentation
Curated Video
Installing Windows
This video will teach you how to install and setup Windows (The victim's machine)
Curated Video
Insufficient Logging and Monitoring
Insufficient logging and monitoring is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Discover Vulnerabilities in Websites
In this video, you will learn about various tools used to discover vulberabilities in web applications.
Curated Video
Why Android
This video will shed the light on the market share of Android and its dominance
Curated Video
Extract APKs From Your Phone
You will learn how to export any Android application that exists on your phone and reverse engineer it in your lab
Curated Video
Intercept_ Analyze_ and Replay Web Traffic
Learn how to leverage the powerful Burp suite in analyzing web traffic and crafting attacks
Curated Video
Different Installation Methods
This video will show you various approaches to setup Kali Linux
Curated Video
Run an Online Password Attack on a Router
Learn how to plan an execute an online password attack on a router
Curated Video
Why KALI
Kali is a powerful pentest box, in this video we will explain the reasons behind its fame
Curated Video
Execute Man-in-the-Middle Attacks
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali
Curated Video
Explore Main Services and Install Necessary Programs
This video will help you get started in setting up your lab
Curated Video
Deface a Website in Few Seconds
Learn how to plan a backdoor and control a website in a minute
Curated Video
Create Your First Trojan and Infiltrate a Target
This video wil show you the baby steps on how to create your first trojan file in Kali Linux. We will put his file into action and start infiltrating data from the victim's machine
Curated Video
Plan DOS and DDOS Attacks
This video will teach you how to use Ettercap to perform DDOS attacks
Curated Video
Perform a DNS Spoofing Attack
This video will teach you how to perform a DNS spoofing attack, and how to take user's URL request to a crafted web application of your own
Curated Video
Hack an Android Phone with Armitage
In this video, we will actually hack an Android phone by deploying our payload using Armitage, which is a GUI for metasploit framework.
Curated Video
Create an IoT WIFI Jammer
This video will show you how to create a hardware WiFi jammer to disrupt the wireless connetivity in a certain area
Curated Video
WPS Cracking
In this video you will learn how to take over a router with enabled WPS protocol
Curated Video
Publish Your Weapons Online
This video will teach you how to prepare your lab for a real world attack
Curated Video
Broken Authentication
This video will explain the broken authentication on web applications and how can attackers leverage this vulnerability to gain unauthorized access