- 01_-_Lab_setup/01_-_Lab_setup.mp432.9 MiB
- 02_-_BurpSuite/03_-_Practical_DEMO_-_Intruder.mp413.7 MiB
- 02_-_BurpSuite/04_-_Burpsuite_-_Spider_Repeater_Comparer.mp411.3 MiB
- 02_-_BurpSuite/02_-_Presentation_-_Intruder.mp42.9 MiB
- 03_-_Wordpress_Scan_-WPScan/06_-_WpScan_-_Practical_Demo.mp413.7 MiB
- 03_-_Wordpress_Scan_-WPScan/05_-_WPScan_-_Presentation.mp47.22 MiB
- 04_-_Blind_SQL_Injection/08_-_Blind_SQL_Injection_DEMO_1.mp49.11 MiB
- 04_-_Blind_SQL_Injection/09_-_Blind_Sqlmap_-_DEMO_2.mp46.16 MiB
- 04_-_Blind_SQL_Injection/07_-_Blind_SQL_injection_Presentation.mp45.84 MiB
- 05_-_Hydra_-_Authentication_Password_Breaker/12_-_Hydra_DEMO_GUI.mp411.4 MiB
- 05_-_Hydra_-_Authentication_Password_Breaker/11_-_Hydra_-_Demo_Commandline.mp46.91 MiB
- 05_-_Hydra_-_Authentication_Password_Breaker/10_-_Hydra_-_Presentation.mp44.3 MiB
- 06_-_XSF_-_Flashing_cross_script/15_-_XSF_DEMO.mp412.5 MiB
- 06_-_XSF_-_Flashing_cross_script/14_-_XSF_Theory_Presentations.mp43.2 MiB
- 07_-_DOM_XSS/17_-_DOM_presentations.mp47.89 MiB
- 07_-_DOM_XSS/18_-_DOM_XSS_DEMO.mp41.7 MiB
- 08_-_Heart_Bleed_-_SSL_Server_Exploitation/22_-_HeartBleed_DEMO.mp423.8 MiB
- 08_-_Heart_Bleed_-_SSL_Server_Exploitation/21_-_HeartBleed_Setup.mp47.06 MiB
- 08_-_Heart_Bleed_-_SSL_Server_Exploitation/20_-_Heart_Bleed_Presentation.mp45.79 MiB
- 09_-_ModSecurity_-_Web_application_firewall/27_-_Modsecurity_Custom_Rules_-_part_1.mp425.4 MiB
- 09_-_ModSecurity_-_Web_application_firewall/28_-_Modsecurity_custom_rules_-_Part_2.mp421.7 MiB
- 09_-_ModSecurity_-_Web_application_firewall/25_-_Modsecurity_Demo.mp419.8 MiB
- 09_-_ModSecurity_-_Web_application_firewall/26_-_Modsecurity_-_Enabling_Advanced_Features.mp410.8 MiB
- 09_-_ModSecurity_-_Web_application_firewall/24_-_Modsecurity_presentation.mp43.87 MiB
- 10_-_Maltego/31_-_Maltego_Demo.mp418.1 MiB
- 10_-_Maltego/30_-_Maltego_Presentation_Audio.mp44.16 MiB
- 11_-_WordPress_Security/34_-_WP_Security_DEMO.mp4116 MiB
- 11_-_WordPress_Security/33_-_WP_Security.mp415.2 MiB
- 12_-_Insecure_Direct_Object_Reference/37_-_Insecure_Direct_Object_Reference_DEMO.mp412.4 MiB
- 12_-_Insecure_Direct_Object_Reference/36_-_Insecure_Direct_Object_Reference.mp44.36 MiB
- 13_-_Misc_-_What_hackers_use/41_-_Remote_Administration_Tool_DEMO.mp423.6 MiB
- 13_-_Misc_-_What_hackers_use/39_-_Javadriveby_DEMO.mp420.2 MiB
- 13_-_Misc_-_What_hackers_use/38_-_JavaDriveby_theory.mp45.99 MiB
- 13_-_Misc_-_What_hackers_use/40_-_Remote_Administration_Tool_Presentation.mp43.55 MiB
- 14_-_Wireless_Attack_using_Android_Phones/43_-_Dsploit_Demo.mp422.5 MiB
- 14_-_Wireless_Attack_using_Android_Phones/42_-_Dsploit_-_Presentation.mp44.54 MiB
- 15_-_JBOSS_Server_Attacks/50_-_JBOSS_-_Exploit_bypassing_authentication_using_HEAD_method.mp418.7 MiB
- 15_-_JBOSS_Server_Attacks/46_-_JBOSS_Manual_Method.mp417.3 MiB
- 15_-_JBOSS_Server_Attacks/48_-_JBOSS_-_Exploiting_using_BSH_Script_-_Manual_Method.mp416.2 MiB
- 15_-_JBOSS_Server_Attacks/45_-_JBOSS_Theory.mp415.5 MiB
- 15_-_JBOSS_Server_Attacks/49_-_JBOSS_-_Exploiting_using_BSH_Script_-_Metasploit_Module.mp47.19 MiB
- 15_-_JBOSS_Server_Attacks/47_-_JBOSS_-_Exploiting_using_Deployment_File_Repository_JSP_.mp45.88 MiB
- 15_-_JBOSS_Server_Attacks/51_-_External_Links_for_study.txt3.33 KiB