Autoplay
Autocomplete
Previous Lesson
Complete and Continue
learn the art of Penetration Testing
Introduction
Intro to Course (4:25)
What is Penetration Testing? (5:33)
Technical Analysis
HTTP (11:00)
Client-Server Understanding (7:43)
Installing kali Linux (3:56)
Installing Metasploitable (3:32)
Linux basics (15:21)
Information Gathering
Open ports, Services & Versions (11:30)
Identify client and server technology (8:19)
5. Discover hidden contents using dirbuster and go buster (12:40)
Exploitation
Reflected XSS (14:42)
Stored XSS (9:08)
Fileupload vulnerability (11:54)
Command execution (11:14)
Login bypass (8:48)
Data retrieval (10:58)
Brute force using burp suite (23:33)
Brute force using hydra (6:38)
Basic IDORS (8:00)
CSRF (11:17)
Conclusion & Bonus tips
Conclusion & bonus tips (10:54)
Data retrieval
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock