Autoplay
Autocomplete
Previous Lesson
Complete and Continue
اختبار اختراق تطبيقات الويب و البج باونتي - المستوى الأول
Introduction
Intro to the Course Structure (5:45)
Install Requirements
Installing the Tools and Setting Up Your Lab (8:26)
How to take Notes for the Course (14:57)
Note-Taking [Quiz]
How to Ask Questions and Communicate with Your Course Mates (6:55)
Linux Fundamentals
Linux Basics - Part 1 (42:50)
Linux Basics - Part 2 (19:03)
Basics for Linux - [Quiz]
Windows Fundamentals
Windows Basics - Part 1 (39:32)
Windows Basics - patrt 1 - Quiz
Network Fundamentals
Network Fundamentals - Part 1 (33:13)
Network Fundamentals - Part 1 - Quiz
How the Web Works
DNS in detail (33:02)
DNS - Quiz
HTTP in detail (47:31)
HTTP In detail - Quiz
How websites work (33:43)
How website work - Quiz
Putting all together (25:57)
Putting all together - Quiz
Essential Web Application Basics
Web Application Basics (55:06)
Web Application Basics - Quiz
JavaScript Basics (51:27)
JavaScript Basics - Quiz
SQL Basics - Part 1 (45:05)
SQL Basics - part 1 - Quiz
Burp Suite Basics - Part 1 (41:30)
Intro to Cryptography Basics (30:04)
Intro to Cryptography Basics - Quiz
Client Side Vulnerabilities
Before we Start! How to Learn Vulnerabilities? (12:43)
HTML Injection & (XSS) Cross-site scripting - part 1 (38:07)
(XSS) Cross-site scripting - part 2 (43:18)
(XSS) Cross-site scripting - part 3 (21:41)
CSP & WAF intro (38:40)
HTML Injection & XSS - Quiz
HTML Injection - Writeups & Reports (26:58)
XSS - Writeups & Reports
Cross-Site requests, SOP , CORS - intro (33:21)
(CSRF) Cross-site Request Forgery - Part 1 (55:29)
(CSRF) SameSite , Preflight Request and others - Part 2 (43:49)
CSRF - Quiz
(CORS) Cross-origin Resource Sharing Misconfiguration (51:44)
CORS misconfiguration - Quiz
Server Side Vulnerabilities
Before we Start! How to Learn Vulnerabilities? (12:43)
Authentication vs Authorization & Access Control Types (29:36)
Attacking Access Control - intro (25:13)
Lab - IDOR vulnerability (35:36)
IDOR - Writeups & Reports (30:21)
IDOR - Quiz
Labs - Privilege Escalation (66:29)
Privilege Escalation - Writeups & Reports (38:26)
Privilege Escalation - Quiz
Logic Bugs - part 1 (38:58)
Logic Bugs - Writeup (21:20)
Logic Bugs - Quiz
Start Hunting , Your Guide to Build your Methodology for Hunting
Pentesting Methodology vs Bug Hunting Methodology (15:05)
What After Learning a Vulnerability? (7:19)
Basic Recon for what you learned - Part 1 (49:42)
Basic Recon for what you learned - Part 2 (58:55)
Automation Basics, How to run scripts? (32:47)
Methodology: Lab Build (19:38)
Methodology: Hunting on HTML Injection (18:51)
Methodology: Hunting on XSS (66:49)
Teach online with
XSS - Writeups & Reports
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock