Uploaded by syed9385

pentester academy videos list for web challenges

advertisement
Port Swigger Material WAP Challenges Course Videos
1)SQL Injection
2)Authentication
2Challenge 1: Form Bruteforcing Solutions
3Challenge 2: HTTP Form Attacks Reloaded
4HTTP Basic Authentication Attack (Easy)
5Basic Authentication and Form Bruteforcing (Intermediate)
6Challenge 2: HTTP Form Attacks Reloaded Solution
7HTTP Basic Authentication Attack - Solutions
8Basic Authentication and Form Bruteforcing - Solutions
9Challenge 5: Digest Authentication Attack
10Challenge 6: Digest Authentication Reloaded
11Challenge 5: Digest Authentication Attack Solutions
12Challenge 6: Digest Authentication Reloaded Solutions
13Challenge 7: Cracking Digest Authentication
14Challenge 7: Cracking Digest Authentication Solution
15Challenge 8: Broken Authentication
16Challenge 8: Broken Authentication Solution
21Challenge 12: Decrypting SSL Traffic
22Challenge 12: Decrypting SSL Traffic Solution
3)Directory Traversal
4)Command Injection
5)Business Logic Vulnerabilities
6)Information Disclosure
7)Access Control
8)File Upload Vulnerabilities
9)SSRF
10)XXE Injection
11)Cross Site Scripting - XSS
39Challenge 20: XSS
40Challenge 21: XSS II
41Challenge 20: XSS Solution
42Challenge 21: XSS II Solution
43Challenge 22: XSS III
44Challenge 23: XSS IV
45Challenge 24: XSS V
46Challenge 25: XSS VI
47Challenge 26: XSS VII
48Challenge 22: XSS III Solution
49Challenge 23: XSS IV Solution
50Challenge 24: XSS V Solution
51Challenge 25: XSS VI Solution
52Challenge 26: XSS VII Solution
53Challenge 27: XSS VIII
54Challenge 28: XSS IX
55Challenge 27: XSS VIII Solution
56Challenge 28: XSS IX Solution
57Challenge 29: XSS X
58Challenge 30: XSS XI
59Challenge 29: XSS X Solution
60Challenge 30: XSS XI Solution
61Challenge 31: XSS XII
62Challenge 32: XSS XIII
63Challenge 31: XSS XII Solution
64Challenge 32: XSS XIII Solution
65Challenge 33: XSS 14
66Challenge 33: XSS 14 Solution
67Challenge 34: XSS 15
68Challenge 34: XSS 15 Solution
69Challenge 35: XSS 16
70Challenge 35: XSS 16 Solution
71Challenge 36: XSS 17
72Challenge 36: XSS 17 Solution
73Google XSS Challenge 1
74Google XSS Challenge 2
75Google XSS Challenge 3
76Google XSS Challenge 4
77Google XSS Challenge 5
78Google XSS Challenge 6
12)Cross Site REquest Forgery - CSRF
95CSRF: If only all Pentests were this Easy!
96CSRF: Not All Links are Clickable
97CSRF: No he won't click your links!
98CSRF: How about a POST?
99CSRF: Would hate a predictable life!
100CSRF: Mutual Exclusivity is Important for Secrecy!
101CSRF: Wow! This just got hard!
102CSRF: We only hire after Reference Checks!
103CSRF: What's in a Name?
104CSRF: Custom Code is Always a Target!
105CSRF: O! Token Where do you hide?
106CSRF: The Web is Cross Domain :)
107CSRF: If only all Pentests were this Easy! (solution)
108CSRF: Not All Links are Clickable (solution)
109CSRF: No he won't click your links! (solution)
110CSRF: How about a POST? (solution)
111CSRF: Would hate a predictable life! (solution)
112CSRF: Mutual Exclusivity is Important for Secrecy! (solution)
113CSRF: Wow! This just got hard! (solution)
114CSRF: We only hire after Reference Checks! (solution)
115CSRF: What's in a Name? (solution)
116CSRF: Custom Code is Always a Target! (solution)
117CSRF: O! Token Where do you hide? (solution)
118CSRF: The Web is Cross Domain :) (solution)
13)Cross Origin Resource Sharing - CORS
14)Clickjacking
15)DOM Based Vulnerabilities
16)WEB Sockets
17)Insecure Deserilization
18)Server Side Template Injection
19)WEB Cache Poisoning
20)HTTP Host Header Attacks
21)HTTP Request Smuggling
22)OAuth Authentication
24) REDIRECTS
79Unvalidated Redirects: As Easy as it Gets
80Unvalidated Redirects: Decode Me!
81Unvalidated Redirects: Daisy Chains!
82Unvalidated Redirects: Hashing
83Unvalidated Redirects: Hash with a Predictable Salt
84Unvalidated Redirects: As Easy as it Gets (Solution)
85Unvalidated Redirects: Decode Me! (Solution)
86Unvalidated Redirects: No Hints this Time!
87Unvalidated Redirects: Salt is included FREE!
88Unvalidated Redirects: Security through Obscurity!
89Unvalidated Redirects: Daisy Chains! (Solution)
90Unvalidated Redirects: Hashing (Solution)
91Unvalidated Redirects: Hash with a Predictable Salt (solution)
92Unvalidated Redirects: No Hints this Time! (solution)
93Unvalidated Redirects: Salt is included FREE! (solution)
94Unvalidated Redirects: Security through Obscurity (solution)
25) HTML INJECTIONS
31Challenge 16: HTML Injection
32Challenge 17: HTML Injection II
33Challenge 18: HTML Injection III
34Challenge 19: HTML Injection IV
35Challenge 16: HTML Injection Solution
36Challenge 17: HTML Injection II Solution
37Challenge 18: HTML Injection III Solution
38Challenge 19: HTML Injection IV Solution
26) SESSION MANAGEMENT
17Challenge 9: Session ID Analysis
18Challenge 9: Session ID Analysis Solution
19Challenge 10: Session ID Analysis II
20Challenge 11: Session ID Analysis III
23Challenge 10: Session ID Analysis II Solutions
24Challenge 11: Session ID Analysis III Solution
1Section Introduction and Challenge 1
25Challenge 13: HTTP Forensics
26Challenge 13: HTTP Forensics Solutions
27Challenge 14: HTTP Traffic File Carving
28Challenge 14: HTTP Traffic File Carving Solution
29Challenge 15: HTTP Traffic File Carving II
30Challenge 15: HTTP Traffic File Carving II Solutions
Download