Curated Video
Identify a DNS Zone Transfer Vulnerability
Learn how to check for the DNS zone transfer vulnerability, a serious weakness that might lead to fully leaking your domain information.
Curated Video
Tools Explained
In this video, we will explain the various tools needed to start reverse engineering an Android application and analyzing the malware. Tools such as APKTool in Kali Linux, Android Studio, various emulators, and other GUI tools for...
Curated Video
Getting Started With Powershell Empire
This video will show you how to install Powershell Empire and install a keylogger on a victim's machine. A jump-start tutorial on how to use this tool.
Curated Video
Control a Database Server with SQLMap-2 new
This video will show you how to leverage SQL injection vulnerability to take full control over a Database server
Curated Video
Analysis of Code4hk APK
This video will deep dive into the analysis of a malicious APK file named Code4hk, and wil show you how hackers can inject an APK within another APK's resources.
Curated Video
Master KALI Desktop Environment
Before crafting attacks, get familiar with the desktop environment of Kali linux
Curated Video
Post-Exploitation Terminologies
This video will teach you the jardong used when it comes to post exploiting a target
Curated Video
DKIM Email Security
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Curated Video
Acquire Malicious Apps1
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Curated Video
Hack Using a Rogue Access Point
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Curated Video
DNS Poisoning Attack
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Curated Video
Create a Simple Ransomware
This video will show you how easy it is to create a simple ranwonware
Curated Video
How Does Port Scanning Work
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Curated Video
Google Security Services
Google adds various security features on top of the Android platform. This video will help you explore those feaures.
Curated Video
Analysis of COVID Spy Max APK
This video will deep dive into the analysis of a spyware APK
Curated Video
Dangerous Permissions
A very important part of doing static malware analysis is to check the dangerous permissions acquired by an application. This video will teach you how to spot those dangerous permissions.
Curated Video
Security Misconfiguration
Security configuration is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Google Dorks Live Examples
Spot the vulnerabilities in the wild, leverage Google to hack into web applications and systems that are published over the Internet. You will be surprised by how easy it is.
Curated Video
Create a $3 Rubber Ducky Key-logger
Rubber ducky is the most famous key logger, but it is expensive. In this video you will learn how to create a similar device by buying an Arduino hardware from AliExpress at a cheap price
Curated Video
Execute an Offline Password Attack on Windows
Learn how to plan an execute an offline password attack on Windows using John The Ripper tool
Curated Video
Components with Known Vulnerabilities
This video will explain the drawbacks of using off the shelf components on your web application
Curated Video
All-in-one Metasploit Framework
This video will explain the powerful metasploit framework
Curated Video
Keyword Search Tecniques
This video will guide you on how to use keyword search techniques in spotting malicious code within an APK
Curated Video
Android Security Features
This video will highlight the various security features oferred by Android