Video Tutorials

Enumerating Web Servers

  • Enumerating web servers using netcat
  • Enumerating web servers using firefox plugins
  • Enumerating web servers using ID Serve

SQL Injection

  • Bypassing poor authentication systems
  • Dumping databases using Sqlmap
  • Getting a shell using Sqlmap

Remote File Inclusion (RFI) / Local File Inclusion (LFI)

  • Remote file inclusion basics
  • Local file inclusion basics

XSS (Cross Site Scripting)

  • XSS Basics
  • XSS Redirect users
  • Cookie stealing using XSS

Session Hijacking

  • Utilizing a stolen cookie

Cookie Manipulation

  • Changing parameters in cookies

Phishing

  • Creating a phishing page
  • Creating a phishing page using iframes and div overlays

Social engineering

  • Using SET (social engineering toolkit)

CSRF (Cross Site Request Forgery)

  • CSRF Basics

Powershell for exploitation

  • Using a macro enabled document to keylog a victim
  • Using a macro enabled document to get a remote shell
  • Compiling a powershell script to an executable
  • Bypassing script restrictions

Netcat

  • Creating a reverse shell
  • Creating a listening shell
  • Port scanning

Wifi Hacking

  • Cracking WEP using AirCrack
  • Cracking WPA/WPA2 using AirCrack

Trojans

  • Binding a trojan to an existing executable

Wireshark

  • Packet sniffing HTTP credentials

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License