Website Hacking Penetration Testing & Bug Bounty Hunting

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size1.8 GB
  • Uploaded ByAJAY777
  • Downloads155
  • Last checkedJul. 31st '20
  • Date uploadedJul. 30th '20
  • Seeders 18
  • Leechers6

Infohash : 7B5541825DCC4BAA75E9C4C8FA16581BC6EF198F

[i]

Website Hacking Penetration Testing & Bug Bounty Hunting

[/i]

Files:

Website Hacking Penetration Testing & Bug Bounty Hunting 3. Preparation - Linux Basics
  • 2. The Linux Terminal & Basic Linux Commands.mp4 (223.5 MB)
  • 1. Basic Overview Of Kali Linux.mp4 (107.4 MB)
  • 1. Basic Overview Of Kali Linux.srt (6.5 KB)
  • 2. The Linux Terminal & Basic Linux Commands.srt (13.9 KB)
  • 2.1 List Of Linux Commands.html (0.1 KB)
  • 3. Configuring Metasploitable & Lab Network Settings.mp4 (15.3 MB)
  • 3. Configuring Metasploitable & Lab Network Settings.srt (7.5 KB)
  • 3.1 How To Fix No Nat Network Issue.html (0.1 KB)
1. Chapter 1
  • 1. Course Introduction.srt (3.5 KB)
  • 1. Course Introduction.mp4 (26.0 MB)
2
  • 1. Lab Overview & Needed Software.mp4 (106.5 MB)
  • 1. Lab Overview & Needed Software.srt (9.6 KB)
  • 1.1 The Lab.pdf (347.0 KB)
  • 1.2 Virtual Box Download Page.html (0.1 KB)
  • 2. Installing Kali 2020 As a Virtual Machine Using a Ready Image.mp4 (142.3 MB)
  • 2. Installing Kali 2020 As a Virtual Machine Using a Ready Image.srt (13.8 KB)
  • 2.1 How To Fix No Nat Network Issue.html (0.1 KB)
  • 2.2 Kali 2020 Download Page.html (0.1 KB)
  • 2.3 How To Fix Blank Screen When Starting Kali.html (0.2 KB)
  • 2.4 Installing Kali Using ISO (use this method to install it as a Main machine)..html (0.1 KB)
  • 3. Installing Metasploitable As a Virtual Machine.mp4 (11.1 MB)
  • 3. Installing Metasploitable As a Virtual Machine.srt (5.4 KB)
  • 3.1 Metasploitable Download Page.html (0.1 KB)
  • 4. Installing Windows As a Virtual Machine.mp4 (9.4 MB)
  • 4. Installing Windows As a Virtual Machine.srt (4.4 KB)
  • 4.1 Windows Image Download Page.html (0.1 KB)
4. Website Basics
  • 1. What is a Website.mp4 (11.7 MB)
  • 1. What is a Website.srt (5.5 KB)
  • 1.1 Intro-what-is-a-website.pdf (360.1 KB)
  • 2. How To Hack a Website .mp4 (16.8 MB)
  • 2. How To Hack a Website .srt (7.9 KB)
5. Information Gathering
  • 1. Gathering Information Using Whois Lookup.mp4 (11.3 MB)
  • 1. Gathering Information Using Whois Lookup.srt (5.9 KB)
  • 1.1 Domaintools Whois Lookup Palge.html (0.1 KB)
  • 1.2 Information Gathering.pdf (111.7 KB)
  • 2. Discovering Technologies Used On The Website.mp4 (16.8 MB)
  • 2. Discovering Technologies Used On The Website.srt (7.3 KB)
  • 2.1 Netcraft.html (0.1 KB)
  • 3. Gathering Comprehensive DNS Information.mp4 (106.5 MB)
  • 3. Gathering Comprehensive DNS Information.srt (12.6 KB)
  • 3.1 robtex.com.html (0.1 KB)
  • 4. Discovering Websites On The Same Server.mp4 (9.3 MB)
  • 4. Discovering Websites On The Same Server.srt (4.6 KB)
  • 5. Discovering Subdomains.mp4 (10.0 MB)
  • 5. Discovering Subdomains.srt (6.6 KB)
  • 5.1 Knock Git Repo.html (0.1 KB)
  • 6. Discovering Sensitive Files.mp4 (15.4 MB)
  • 6. Discovering Sensitive Files.srt (9.0 KB)
  • 7. Analysing Discovered Files.mp4 (8.6 MB)
  • 7. Analysing Discovered Files.srt (5.4 KB)
  • 8. Maltego - Discovering Servers, Domains & Files.mp4 (16.8 MB)
  • 8. Maltego - Discovering Servers, Domains & Files.srt (10.2 KB)
  • 9. Maltego - Discovering Websites, Hosting Provider & Emails.mp4 (10.1 MB)
  • 9. Maltego - Discovering Websites, Hosting Provider & Emails.srt (6.1 KB)
6. File Upload Vulnerabilities
  • 1. How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites.mp4 (12.1 MB)
  • 1. How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites.srt (8.9 KB)
  • 1.1 File upload, Code execution, LFI, RFI, SQLi, XSS.pdf (541.8 KB)
  • 2. HTTP Requests - GET & POST.mp4 (10.1 MB)
  • 2. HTTP Requests - GET & POST.srt (5.4 KB)
  • 3. Intercepting HTTP Requests.mp4 (16.0 MB)
  • 3. Intercepting HTTP Requests.srt (9.4 KB)
  • 3.1 Configuring Burp to Handle HTTPS.html (0.1 KB)
  • 4. Exploiting Advanced File Upload Vulnerabilities To Hack Websites.mp4 (11.0 MB)
  • 4. Exploiting Advanced File Upload Vulnerabilities To Hack Websites.srt (5.8 KB)
  • 5. Exploiting More Advanced File Upload Vulnerabilities.mp4 (9.1 MB)
  • 5. Exploiting More Advanced File Upload Vulnerabilities.srt (5.4 KB)
  • 6. [Security] Fixing File Upload Vulnerabilities.mp4 (13.3 MB)
  • 6. [Security] Fixing File Upload Vulnerabilities.srt (8.2 KB)
  • 6.1 Link To Secure File Upload Code.html (0.2 KB)
7. Code Execution Vulnerabilities
  • 1. How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack Websites.mp4 (12.4 MB)
  • 1. How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack Websites.srt (9.1 KB)
  • 1.1 code-execution-reverse-shell-commands.txt (0.9 KB)
  • 2. Exploiting Advanced Code Execution Vulnerabilities.mp4 (13.1 MB)
  • 2. Exploiting Advanced Code Execution Vulnerabilities.srt (7.7 KB)
  • 3. [Security] - Fixing Code Execution Vulnerabilities.mp4 (10.4 MB)
  • 3. [Security] - Fixing Code Execution Vulnerabilities.srt (7.4 KB)
8. Local File Inclusion Vulnerabilities (LFI)
  • 1. What are they And How To Discover & Exploit Them.mp4 (9.2 MB)
  • 1. What are they And How To Discover & Exploit Them.srt (6.6 KB)
  • 2. Gaining Shell Access From LFI Vulnerabilities - Method 1.mp4 (15.5 MB)
  • 2. Gaining Shell Access From LFI Vulnerabilities - Method 1.srt (9.1 KB)
  • 3. Gaining Shell Access From LFI Vulnerabilities - Method 2.mp4 (22.4 MB)
  • 3. Gaining Shell Access From LFI Vulnerabilities - Method 2.srt (10.2 MB)
9. Remote File Inclusion Vulnerabilities (RFI)
  • 1. Remote File Inclusion Vulnerabilities - Configuring PHP Settings.mp4 (7.3 MB)
  • 1. Remote File Inclusion Vulnerabilities - Configuring PHP Settings.srt (4.3 KB)
  • 2. Remote File Inclusion Vulnerabilities - Discovery & Exploitation.mp4 (8.5 MB)
  • 2. Remote File Inclusion Vulnerabilities - Discovery & Exploitation.srt (7.4 KB)
  • 3. Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites.mp4 (5.8 MB)
  • 3. Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites.srt (3.5 KB)
  • 4. [Security] Fixing File Inclusion Vulnerabilities.mp4 (10.4 MB)
  • 4. [Security] Fixing Fil

Code:

  • udp://tracker.leechers-paradise.org:6969/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://tracker.zer0day.to:1337/announce
  • udp://eddie4.nl:6969/announce