ZDResearch Advanced Web Hacking

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size2.3 GB
  • Uploaded BySource1337
  • Downloads159
  • Last checkedMay. 18th '21
  • Date uploadedMay. 15th '21
  • Seeders 14
  • Leechers13

Infohash : 8C012CB4CC5766619915218A08D82D1182B70216

❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤

Quote:

We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without “Them”, you and we won’t be here having this conversation. Think about it! ☮️ Peace.✌️



Code:

This is the flagship web application security course provided by ZDResearch Training. In this course you will go through a multitude of web application security topics, all accompanied by demos and hands-on labs. Topics will cover traditional OWASP Top 10 issues as well as several other cutting-edge topics, such as HTML5 attacks, Source Code Auditing and Analysis, CAPTCHA bypass and many more.

Advanced Web Hacking course is the product of 10+ years of web application vulnerability research performed by ZDResearch hunters. Not only it will go through some of the typical methods and techniques used to attack and exploit (as well as defend) web applications, it will teach you the delicate tricks of the trade in the process. For example, you will learn how to fully exploit a system that only allows SQL injection into the LIMIT BY clause, or how to bypass taint based web application firewalls.


Files:

ZDResearchAdvancedWebHacking.5.2 CH_4_CSRF Attacks
  • Section4-Lecture1-Introduction.mp4 (56.1 MB)
  • Advanced Web Hacking Exdemy.mp4 (24.5 MB)
  • Section4-Assignment1-FetchAPI.pdf (326.5 KB)
  • Section4-Lecture2-IntroductionDemo.mp4 (11.9 MB)
  • Section4-Lecture3-CSRFAndCSRFToken.mp4 (22.5 MB)
  • Section4-Lecture4-HowCSRFWorks.mp4 (11.4 MB)
  • Section4-Lecture5-GetAndPostCSRF.mp4 (26.6 MB)
  • Section4-Lecture6-CSRFViaJavascript.mp4 (27.4 MB)
  • Section4-Lecture7-FileUploadCSRF.mp4 (14.2 MB)
  • Section4-Lecture9-RealWorldCSRFProtection.mp4 (21.6 MB)
CH_1_Advanced SQL Injection
  • 6 Simple Memory Techniques.html (0.1 KB)
  • Chap_1_SQLi_Prologue.mp4 (39.3 MB)
  • Section1-Assignment1-FindingSQLInjection.pdf (348.9 KB)
  • Section1-Assignment2-PatchSQLInjection.pdf (455.4 KB)
  • Section1-Assignment3-AuthenticationBypass.pdf (258.4 KB)
  • Section1-Assignment4-DumpTable.pdf (285.8 KB)
  • Section1-Assignment5-WriteFilesWithSQLInjection.pdf (335.3 KB)
  • Section1-Assignment6-AutomaticBlindSQLInjection-script.pdf (372.5 KB)
  • Section1-Assignment7-BypassBlacklists.pdf (294.9 KB)
  • Section1-Assignment8-SecondOrderSQLInjection.pdf (245.7 KB)
  • Section1-Lecture2-Finding_SQL_Injection-Automatticaly.mp4 (50.0 MB)
  • Section1-Lecture2-Finding_SQL_Injection-Manually.mp4 (40.0 MB)
  • Section1-Lecture3-Protection_Strategies.mp4 (19.1 MB)
  • Section1-Lecture4-DBMS_Detection.mp4 (17.9 MB)
  • Section1-Lecture5-Authentication_Bypass.mp4 (19.1 MB)
  • Section1-Lecture6-Union_Based.mp4 (49.7 MB)
  • Section1-Lecture7-Reading_and_Writing_Files.mp4 (18.4 MB)
  • Section1-Lecture8-Blind_Injection.mp4 (35.4 MB)
  • Section1-Lecture9-Double_Blind.mp4 (20.8 MB)
  • Section1-Lecture10-Error_Based.mp4 (46.7 MB)
  • Section1-Lecture11-System_Takeover.mp4 (52.8 MB)
  • Section1-Lecture12-Automated_Tools.mp4 (8.2 MB)
  • Section1-Lecture13-Bypassing_Blacklists.mp4 (10.3 MB)
  • Section1-Lecture14-Orderby_Limit.mp4 (16.4 MB)
  • Section1-Lecture15-Second_Order.mp4 (42.1 MB)
  • ZDResearch-AWH-Prologue.pdf (268.3 KB)
CH_2_Other Injection Attacks
  • Linux Tails Operating System.html (0.1 KB)
  • Section2-Assignment1-CommandInjection.pdf (240.9 KB)
  • Section2-Assignment2-CodeInjection.pdf (236.6 KB)
  • Section2-Assignment3-XPathInjection.pdf (240.7 KB)
  • Section2-Lecture1-OSCommandInjection.mp4 (10.1 MB)
  • Section2-Lecture2-FindingOSCommandInjection.mp4 (13.7 MB)
  • Section2-Lecture3-ReverseShellUsingCommandInjection.mp4 (14.1 MB)
  • Section2-Lecture4-BypassingFilenameFilters.mp4 (22.0 MB)
  • Section2-Lecture5-BypassingFilenameFiltersDemo.mp4 (14.2 MB)
  • Section2-Lecture6-BypassingDirectoryStructureFilters.mp4 (11.6 MB)
  • Section2-Lecture7-BypassingFileTypeFilters.mp4 (21.0 MB)
  • Section2-Lecture8-CodeInjection.mp4 (45.2 MB)
  • Section2-Lecture9-FileInclusionDemo.mp4 (15.9 MB)
  • Section2-Lecture10-CodeInjectionDemo.mp4 (19.3 MB)
  • Section2-Lecture11-UnsafeReflection.mp4 (14.9 MB)
  • Section2-Lecture12-ObjectInjection.mp4 (34.3 MB)
  • Section2-Lecture13-ObjectInjectionDemo.mp4 (36.5 MB)
  • Section2-Lecture14-XXEInjection.mp4 (10.5 MB)
  • Section2-Lecture15-XXEDemo.mp4 (11.8 MB)
  • Section2-Lecture16-XPathInjection.mp4 (16.8 MB)
CH_3_XSS Attacks
  • Section3-Assignment1-ReflectiveXSS.pdf (237.1 KB)
  • Section3-Assignment2-SessionHijacking.pdf (236.4 KB)
  • Section3-Assignment3-BypassXSSFilter.pdf (298.0 KB)
  • Section3-Assignment4-XSSAndEncoding.pdf (248.4 KB)
  • Section3-Assignment5-PreventXSS.pdf (250.3 KB)
  • Section3-Lecture1-Introduction.mp4 (17.3 MB)
  • Section3-Lecture2-ReflectiveXSS.mp4 (7.6 MB)
  • Section3-Lecture3-ReflectiveXSSDemo.mp4 (8.8 MB)
  • Section3-Lecture4-ReflectiveXSSRealWorldDemo.mp4 (7.9 MB)
  • Section3-Lecture5-PersistentXSS.mp4 (6.6 MB)
  • Section3-Lecture6-PersistentXSSDemo.mp4 (4.1 MB)
  • Section3-Lecture7-PersistentXSSRealWorldDemo.mp4 (8.9 MB)
  • Section3-Lecture8-DOMXSS.mp4 (5.9 MB)
  • Section3-Lecture9-DOMXSSDemo.mp4 (9.1 MB)
  • Section3-Lecture10-DOMXSSRealWorldExample.mp4 (9.8 MB)
  • Section3-Lecture11-mXSS.mp4 (5.5 MB)
  • Section3-Lecture12-mXSSDemo.mp4 (15.4 MB)
  • Section3-Lecture13-SessionHijackingWithXSS.mp4 (11.0 MB)
  • Section3-Lecture14-SessionHijackingDemo.mp4 (9.4 MB)
  • Section3-Lecture15-PhishingWithXSS.mp4 (12.6 MB)
  • Section3-Lecture16-XSSKeyloggers.mp4 (19.6 MB)
  • Section3-Lecture17-ClickjackingWithXSS.mp4 (14.7 MB)
  • Section3-Lecture18-ClickjackingDemo.mp4 (4.5 MB)
  • Section3-Lecture19-CryptocurrencyMiningWithXSS.mp4 (29.6 MB)
  • Section3-Lecture20-RemoteControlWithXSS.mp4 (16.9 MB)
  • Section3-Lecture21-BypassingXSSBlacklists.mp4 (14.6 MB)
  • Section3-Lecture22-PreventingXSS.mp4 (15.7 MB)
. Before you Start - Download Resources and tools
  • Download Resources and Tools (Attechments).html (0.1 KB)
CH_5_HTML5 Attacks
  • Section5-Assignment1-Pastejacking.pdf (255.1 KB)
  • Section5-Lecture1-Introduction.mp4 (1.6 MB)
  • Section5-Lecture2-CrossWindowMessaging.mp4 (16.5 MB)
  • Section5-Lecture3-CrossWindowMessagingDemo.mp4 (11.5 MB)
  • Section5-Lecture4-CrossOriginResourceSharing.mp4 (13.7 MB)
  • Section5-Lecture5-CORSRealWorldExample.mp4 (13.8 MB)
  • Section5-Lecture6-WebSockets.mp4 (38.8 MB)
  • Section5-Lecture7-WebSocketHijackingDemo.mp4 (16.4 MB)
  • Section5-Lecture8-WebStorage.mp4 (6.9 MB)
  • Section5-Lecture9-WebStorageDemo.mp4 (10.5 MB)
  • Section5-Lecture10-ContentSecurityPolicy.mp4 (10.2 MB)
  • Section5-Lecture11-CSPDemo.mp4 (17.7 MB)
  • Section5-Lecture12-DragAndDrop.mp4 (6.9 MB)
  • Section5-Lecture13-DragAndDropXSS.mp4 (7.1 MB)
  • You Can Boost Brain Power.html (0.1 KB)
CH_6_Session Management Attacks
  • Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html (0.1 KB)
  • Section6-Assignment1-SessionHijacking.pdf (239.0 KB)
  • Code:

    • udp://tracker.torrent.eu.org:451/announce
    • udp://tracker.moeking.me:6969/announce
    • http://tracker-cdn.moeking.me:2095/announce
    • udp://wassermann.online:6969/announce
    • udp://vibe.community:6969/announce
    • udp://valakas.rollo.dnsabr.com:2710/announce
    • udp://udp-tracker.shittyurl.org:6969/announce
    • udp://tracker1.bt.moack.co.kr:80/announce
    • udp://tracker0.ufibox.com:6969/announce
    • udp://tracker.zerobytes.xyz:1337/announce
    • udp://tracker.zemoj.com:6969/announce
    • udp://tracker.v6speed.org:6969/announce
    • udp://tracker.uw0.xyz:6969/announce