Course curriculum
-
1
Ghanimah Videos
-
Exploring SQL Injections (WAP)
-
Dashboard Unlocking
-
Manipulating Requests using Burpsuite Intruder
-
How to install Burp Suite Pro
-
Hunting Down User Profiles
-
Don't let that SQL injections happened to your Database (WAP)
-
Automating SQL Injections Vulnerability Detection (WAP)
-
Map the network
-
Diving into SQL and Databases (WAP)
-
VA using ZAP
-
Intercepting Proxies via Burpsuite
-
How to enable 2 factor Authentication
-
DNS Recon
-
Recon using Recon-ng
-
Dig into the DNS
-
Introducing DNSdumpster
-
Detecting Firewalls
-
Firewall and Intrusion Detection System Evasion
-
Nmap scripting engine
-
Managing and Report Projects using Dradis CE
-
Vulnerability Scanning Using Burpsuite
-
Authenticated scans using Burpsuite
-
Flan Scan
-
Certs using OpenSSL and PenTools Script
-
Hydra and Dictionary Attacks
-
Hashcat, decoding passwords offline
-
Nafi Linux vs other Linux Distros
-
-
2
WAP
-
OWASP TOP 10 vulnerabilities scanning using w4af
-
Cross site request Forgery (CSRF)... Explained
-
Stop that CSRF
-
Metasploit for FTP
-
Role Hijacking on Heist Academy
-
Role Hijacking behind the scenes
-
Hack into the Admin Panel
-
Remote Code Execution on Ice Breakers Pro
-
Practicing Reverse Shells
-
Exploit MS-SQL
-
Searching Vulnerabilities on Shodan
-
Knowing Your Target Using theHarvestor
-
-
3
Network Pentesting Labs
-
TFTP Traffic Analysis using WireShark
-
SMB Traffic Analysis
-