ZDResearch Advanced Web Hacking
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size2.3 GB
- Uploaded BySource1337
- Downloads159
- Last checkedMay. 18th '21
- Date uploadedMay. 15th '21
- Seeders 14
- Leechers13
Infohash : 8C012CB4CC5766619915218A08D82D1182B70216
❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤
Quote:
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without “Them”, you and we won’t be here having this conversation. Think about it! ☮️ Peace.✌️
Code:
This is the flagship web application security course provided by ZDResearch Training. In this course you will go through a multitude of web application security topics, all accompanied by demos and hands-on labs. Topics will cover traditional OWASP Top 10 issues as well as several other cutting-edge topics, such as HTML5 attacks, Source Code Auditing and Analysis, CAPTCHA bypass and many more.
Advanced Web Hacking course is the product of 10+ years of web application vulnerability research performed by ZDResearch hunters. Not only it will go through some of the typical methods and techniques used to attack and exploit (as well as defend) web applications, it will teach you the delicate tricks of the trade in the process. For example, you will learn how to fully exploit a system that only allows SQL injection into the LIMIT BY clause, or how to bypass taint based web application firewalls.
Advanced Web Hacking course is the product of 10+ years of web application vulnerability research performed by ZDResearch hunters. Not only it will go through some of the typical methods and techniques used to attack and exploit (as well as defend) web applications, it will teach you the delicate tricks of the trade in the process. For example, you will learn how to fully exploit a system that only allows SQL injection into the LIMIT BY clause, or how to bypass taint based web application firewalls.
Files:
ZDResearchAdvancedWebHacking.5.2 CH_4_CSRF Attacks- Section4-Lecture1-Introduction.mp4 (56.1 MB)
- Advanced Web Hacking Exdemy.mp4 (24.5 MB)
- Section4-Assignment1-FetchAPI.pdf (326.5 KB)
- Section4-Lecture2-IntroductionDemo.mp4 (11.9 MB)
- Section4-Lecture3-CSRFAndCSRFToken.mp4 (22.5 MB)
- Section4-Lecture4-HowCSRFWorks.mp4 (11.4 MB)
- Section4-Lecture5-GetAndPostCSRF.mp4 (26.6 MB)
- Section4-Lecture6-CSRFViaJavascript.mp4 (27.4 MB)
- Section4-Lecture7-FileUploadCSRF.mp4 (14.2 MB)
- Section4-Lecture9-RealWorldCSRFProtection.mp4 (21.6 MB)
- 6 Simple Memory Techniques.html (0.1 KB)
- Chap_1_SQLi_Prologue.mp4 (39.3 MB)
- Section1-Assignment1-FindingSQLInjection.pdf (348.9 KB)
- Section1-Assignment2-PatchSQLInjection.pdf (455.4 KB)
- Section1-Assignment3-AuthenticationBypass.pdf (258.4 KB)
- Section1-Assignment4-DumpTable.pdf (285.8 KB)
- Section1-Assignment5-WriteFilesWithSQLInjection.pdf (335.3 KB)
- Section1-Assignment6-AutomaticBlindSQLInjection-script.pdf (372.5 KB)
- Section1-Assignment7-BypassBlacklists.pdf (294.9 KB)
- Section1-Assignment8-SecondOrderSQLInjection.pdf (245.7 KB)
- Section1-Lecture2-Finding_SQL_Injection-Automatticaly.mp4 (50.0 MB)
- Section1-Lecture2-Finding_SQL_Injection-Manually.mp4 (40.0 MB)
- Section1-Lecture3-Protection_Strategies.mp4 (19.1 MB)
- Section1-Lecture4-DBMS_Detection.mp4 (17.9 MB)
- Section1-Lecture5-Authentication_Bypass.mp4 (19.1 MB)
- Section1-Lecture6-Union_Based.mp4 (49.7 MB)
- Section1-Lecture7-Reading_and_Writing_Files.mp4 (18.4 MB)
- Section1-Lecture8-Blind_Injection.mp4 (35.4 MB)
- Section1-Lecture9-Double_Blind.mp4 (20.8 MB)
- Section1-Lecture10-Error_Based.mp4 (46.7 MB)
- Section1-Lecture11-System_Takeover.mp4 (52.8 MB)
- Section1-Lecture12-Automated_Tools.mp4 (8.2 MB)
- Section1-Lecture13-Bypassing_Blacklists.mp4 (10.3 MB)
- Section1-Lecture14-Orderby_Limit.mp4 (16.4 MB)
- Section1-Lecture15-Second_Order.mp4 (42.1 MB)
- ZDResearch-AWH-Prologue.pdf (268.3 KB)
- Linux Tails Operating System.html (0.1 KB)
- Section2-Assignment1-CommandInjection.pdf (240.9 KB)
- Section2-Assignment2-CodeInjection.pdf (236.6 KB)
- Section2-Assignment3-XPathInjection.pdf (240.7 KB)
- Section2-Lecture1-OSCommandInjection.mp4 (10.1 MB)
- Section2-Lecture2-FindingOSCommandInjection.mp4 (13.7 MB)
- Section2-Lecture3-ReverseShellUsingCommandInjection.mp4 (14.1 MB)
- Section2-Lecture4-BypassingFilenameFilters.mp4 (22.0 MB)
- Section2-Lecture5-BypassingFilenameFiltersDemo.mp4 (14.2 MB)
- Section2-Lecture6-BypassingDirectoryStructureFilters.mp4 (11.6 MB)
- Section2-Lecture7-BypassingFileTypeFilters.mp4 (21.0 MB)
- Section2-Lecture8-CodeInjection.mp4 (45.2 MB)
- Section2-Lecture9-FileInclusionDemo.mp4 (15.9 MB)
- Section2-Lecture10-CodeInjectionDemo.mp4 (19.3 MB)
- Section2-Lecture11-UnsafeReflection.mp4 (14.9 MB)
- Section2-Lecture12-ObjectInjection.mp4 (34.3 MB)
- Section2-Lecture13-ObjectInjectionDemo.mp4 (36.5 MB)
- Section2-Lecture14-XXEInjection.mp4 (10.5 MB)
- Section2-Lecture15-XXEDemo.mp4 (11.8 MB)
- Section2-Lecture16-XPathInjection.mp4 (16.8 MB)
- Section3-Assignment1-ReflectiveXSS.pdf (237.1 KB)
- Section3-Assignment2-SessionHijacking.pdf (236.4 KB)
- Section3-Assignment3-BypassXSSFilter.pdf (298.0 KB)
- Section3-Assignment4-XSSAndEncoding.pdf (248.4 KB)
- Section3-Assignment5-PreventXSS.pdf (250.3 KB)
- Section3-Lecture1-Introduction.mp4 (17.3 MB)
- Section3-Lecture2-ReflectiveXSS.mp4 (7.6 MB)
- Section3-Lecture3-ReflectiveXSSDemo.mp4 (8.8 MB)
- Section3-Lecture4-ReflectiveXSSRealWorldDemo.mp4 (7.9 MB)
- Section3-Lecture5-PersistentXSS.mp4 (6.6 MB)
- Section3-Lecture6-PersistentXSSDemo.mp4 (4.1 MB)
- Section3-Lecture7-PersistentXSSRealWorldDemo.mp4 (8.9 MB)
- Section3-Lecture8-DOMXSS.mp4 (5.9 MB)
- Section3-Lecture9-DOMXSSDemo.mp4 (9.1 MB)
- Section3-Lecture10-DOMXSSRealWorldExample.mp4 (9.8 MB)
- Section3-Lecture11-mXSS.mp4 (5.5 MB)
- Section3-Lecture12-mXSSDemo.mp4 (15.4 MB)
- Section3-Lecture13-SessionHijackingWithXSS.mp4 (11.0 MB)
- Section3-Lecture14-SessionHijackingDemo.mp4 (9.4 MB)
- Section3-Lecture15-PhishingWithXSS.mp4 (12.6 MB)
- Section3-Lecture16-XSSKeyloggers.mp4 (19.6 MB)
- Section3-Lecture17-ClickjackingWithXSS.mp4 (14.7 MB)
- Section3-Lecture18-ClickjackingDemo.mp4 (4.5 MB)
- Section3-Lecture19-CryptocurrencyMiningWithXSS.mp4 (29.6 MB)
- Section3-Lecture20-RemoteControlWithXSS.mp4 (16.9 MB)
- Section3-Lecture21-BypassingXSSBlacklists.mp4 (14.6 MB)
- Section3-Lecture22-PreventingXSS.mp4 (15.7 MB)
- Download Resources and Tools (Attechments).html (0.1 KB)
- Section5-Assignment1-Pastejacking.pdf (255.1 KB)
- Section5-Lecture1-Introduction.mp4 (1.6 MB)
- Section5-Lecture2-CrossWindowMessaging.mp4 (16.5 MB)
- Section5-Lecture3-CrossWindowMessagingDemo.mp4 (11.5 MB)
- Section5-Lecture4-CrossOriginResourceSharing.mp4 (13.7 MB)
- Section5-Lecture5-CORSRealWorldExample.mp4 (13.8 MB)
- Section5-Lecture6-WebSockets.mp4 (38.8 MB)
- Section5-Lecture7-WebSocketHijackingDemo.mp4 (16.4 MB)
- Section5-Lecture8-WebStorage.mp4 (6.9 MB)
- Section5-Lecture9-WebStorageDemo.mp4 (10.5 MB)
- Section5-Lecture10-ContentSecurityPolicy.mp4 (10.2 MB)
- Section5-Lecture11-CSPDemo.mp4 (17.7 MB)
- Section5-Lecture12-DragAndDrop.mp4 (6.9 MB)
- Section5-Lecture13-DragAndDropXSS.mp4 (7.1 MB)
- You Can Boost Brain Power.html (0.1 KB)
- Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html (0.1 KB)
- Section6-Assignment1-SessionHijacking.pdf (239.0 KB)
-
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.moeking.me:6969/announce
- http://tracker-cdn.moeking.me:2095/announce
- udp://wassermann.online:6969/announce
- udp://vibe.community:6969/announce
- udp://valakas.rollo.dnsabr.com:2710/announce
- udp://udp-tracker.shittyurl.org:6969/announce
- udp://tracker1.bt.moack.co.kr:80/announce
- udp://tracker0.ufibox.com:6969/announce
- udp://tracker.zerobytes.xyz:1337/announce
- udp://tracker.zemoj.com:6969/announce
- udp://tracker.v6speed.org:6969/announce
- udp://tracker.uw0.xyz:6969/announce