Never stop talking " STOP the Gaza Genocide "

Web PenTesting | Motasem Hamdan Cyber Security & Tech

Motasem Hamdan   Cyber Security & Tech

Motasem Hamdan Cyber Security & Tech

Motasem Hamdan is a content creator, instructor, swimmer and entrepreneur who creates cyber security training videos and articles, provides marketing consultancy and writes research papers in healthcare cyber security.. Motasem also owns the masterminds group which is a group of authors who create study notes, book summaries and courses in cyber security, IT, health and fitness, business and money and digital marketing.. Instagram: https://www.instagram.com/mastermindstudynotes/. Website:

Course Details

Course Lessons

  1. 1 | What is Blind XSS & How Hackers Use it to Steal Your Browser Cookies? 00:12:24
  2. 2 | How Can Stored XSS Vulnerability Lead to Cookie Stealing? Practical Training Scenario 00:12:28
  3. 3 | Local File Inclusion & Log Poisoning Explained CTF Walkthrough 00:14:23
  4. 4 | Session ID Hijacking With Python OverTheWire Natas 18-19 00:13:04
  5. 5 | Using Burp Suite for Session Hijacking OverTheWire Natas Level 17-18 00:10:09
  6. 6 | Time Based SQL Injection OverTheWire Natas Level 16-17 00:12:17
  7. 7 | Bypassing SQL Filters Using Command Substitution OverTheWire Natas Level 15-16 00:12:46
  8. 8 | Blind SQL Injection With Python OverTheWire Natas Level 15 00:12:29
  9. 9 | SQL Injection Bypassing Double Quotes OverTheWire Natas Level 14 00:14:00
  10. 10 | File Upload Vulnerabilities P12 OverTheWire Natas 13 00:08:58
  11. 11 | File Upload Vulnerabilities P11 OverTheWire Natas Level 12-13 00:12:04
  12. 12 | PHP Session Hijacking With XOR Encryption OverTheWire War Games Natas Level 11 00:11:47
  13. 13 | Intro to Web Application Security TryHackMe Introduction to Cyber Security Path 00:22:32
  14. 14 | Understanding The Bypass Of File Upload Extension Filters P10 TryHackMe Opacity 00:21:12
  15. 15 | Demonstrating XSS,RCE and PostgreSQL Exploitation CTF Walkthrough 00:23:46
  16. 16 | Docker Privilege Escalation and SSTI Exploitation CTF Walkthrough 00:30:25
  17. 17 | PHP Static-Eval Exploitation CTF Walkthrough 00:15:17
  18. 18 | Python Pickle Exploitation CTF Walkthrough 00:20:45
  19. 19 | Fuzzing Web Applications with Wfuzz CTF Walkthrough 00:15:39
  20. 20 | IFrame and HTML Injection TryHackMe MD2PDF 00:09:18
  21. 21 | OWASP Top 10 API Vulnerabilities Explained Part Four TryHackMe 00:14:18
  22. 22 | OWASP Top 10 API Vulnerabilities Explained Part 3 TryHackMe 00:13:37
  23. 23 | OWASP TOP 10 API Vulnerabilities Explained Part Two TryHackMe 00:16:23
  24. 24 | Server Side Request Forgery Simple Demonstration TryHackMe Surf 00:11:19
  25. 25 | Web Application Firewall Evasion CTF Walkthrough 00:23:49
  26. 26 | Broken Authentication OWASP Top 10 TryHackMe Overpass 00:22:23
  27. 27 | Complete Guide to BurpSuite Intruder TryHackMe Junior Penetration Tester 00:47:38
  28. 28 | Command Injection Vulnerability Explained TryHackMe Junior Penetration Tester 00:12:13
  29. 29 | Cross Site Scripting XSS Explained TryHackMe Junior Penetration Tester OSCP 00:26:38
  30. 30 | SQL Injection Vulnerability Explained TryHackMe Junior Penetration Tester OSCP 00:46:09
  31. 31 | File Inclusion Vulnerability Explained TryHackMe Junior Penetration Tester OSCP 00:33:40
  32. 32 | Web Application Content Enumeration TryHackMe Content Discovery 00:30:28
  33. 33 | Insecure Direct Object Reference Vulnerability Explained (IDOR) TryHackMe IDOR 00:10:22
  34. 34 | Server Side Template Injection Vulnerability Explained TryHackMe SSTI 00:18:50
  35. 35 | Basic Penetration Testing Tools TryHackMe ToolsRus 00:15:28
  36. 36 | Understanding Insecure Direct Object Reference Vulnerability TryHackMe ZTH: Web 2 00:09:44
  37. 37 | Understanding SSRF : Server Side Request Forgery Vulnerability TryHackMe 00:13:46
  38. 38 | XXE and JSON Web Tokens Vulnerabilities TryHackMe ZTH: Obscure Web Vulns 00:14:03
  39. 39 | Understanding JSON Web Token Vulnerabilities TryHackMe 00:11:52
  40. 40 | Understanding Server Side Template Injection TryHackMe 00:20:15
  41. 41 | Demonstrating Cross Site Scripting Filter Bypass Techniques TryHackMe 00:13:24
  42. 42 | XML External Entity Vulnerability To SSH Shell TryHackMe 00:13:06
  43. 43 | Security Testing Techniques For Authentication Mechanisms TryHackMe 00:19:20
  44. 44 | Understanding Local File Inclusion Vulnerability TryHackmMe LFI 00:13:12
  45. 45 | Web Application Vulnerability Scanning with OWASP ZAP TryHackMe 00:20:20
  46. 46 | CGI and Tomcat Security Testing with Metasploit Advent of Cyber 00:16:24
  47. 47 | Anatomy and Analysis of SQL Injection TryHackMe Advent of Cyber 00:20:55
  48. 48 | Understanding Fuzzing in Cybersecurity TryHackMe Advent of Cyber 00:15:49
  49. 49 | Re-Visiting File Upload Vulnerabilities P8 TryHackMe Advent of Cyber 00:15:42
  50. 50 | Understanding Cookies Security TryHackMe Advent of Cyber 00:09:45
  51. 51 | Local File Inclusion in Node.js TryHackMe Advent of Cyber 1 Day 15 00:15:05
  52. 52 | Bypassing Server Side Upload Filters P6 Upload Vulnerabilities TryHackMe 00:14:48
  53. 53 | Exposing Sensitive Data and Viewing other users shopping carts - OWASP Juice Shop TyHackMe 00:15:44
  54. 54 | Broken Authentication and SQL Injection OWASP Juice Shop TryHackMe 00:13:43
  55. 55 | Analyzing Logs and Exploiting PHP Book Store - TryHackMe OWASP Top 10 00:10:51
  56. 56 | Explaining Insecure Deserialization Vulnerability - COMPTIA Pentest+ TryHackMe OWASP 00:15:36
  57. 57 | Finding Users Cookies with Reflective Cross Site Scripting - TryHackMe COMPTIA Pentest+ Pathway 00:10:12
  58. 58 | Grabbing Cookies With Stored Cross Site Scripting (Testing Scenario ) - TryHackMe 00:33:56
  59. 59 | Finding Security Misconfigurations in a Website - COMPTIA Pentest+ TryHackMe OWASP Top 10 00:16:48
  60. 60 | Explaining XML vulnerabilities [Owasp] - COMPTIA Pentest+ Course Preparation TryHackMe 00:13:46
  61. 61 | Finding Sensitive Data in a Website - COMPTIA Pentest+ TryHackMe OWASP 00:11:35
  62. 62 | Command Injection Vulnerability Explained TryHackMe OWASP TOP 10 Walkthrough 00:12:20
  63. 63 | Demonstrating PHP Filters Bypass For Local File Inclusion - TryHackMe DogCat 00:39:03
  64. 64 | Demonstrating Web Application Vulnerabilities - Cyberseclabs Shock 00:15:38
  65. 65 | Testing For SQL Injection Database Vulnerability in search fields - bWAPP 00:24:42
  66. 66 | Penetration testing series - Part10: Cyberseclabs CMS walkthrough 00:16:07
  67. 67 | Penetration Testing Series - Part9: Testing For PHP Command Injection 00:07:53
  68. 68 | Penetration Testing Series - Part:7 - OS Command Injection 00:10:39
  69. 69 | bWAPP - Part 5: Mail Header Injection 00:11:31
  70. 70 | bWAPP - Part 3: IFrame Injection 00:10:11
  71. 71 | BWAPP - Part 2 : HTML Injection 00:21:01
  72. 72 | Ultimate Guide to Manual SQL Injection Testing and Training 00:35:56
  73. 73 | From Local File Inclusion to Remote Shell OSCP Video Course Prep 00:20:37
  74. 74 | Fingerprinting and Detecting Web Application Firewalls 00:13:15
  75. 75 | XML External Entity Injection [113] - OWASP 00:08:19
  76. 76 | OWASP Directory Traversal - Sunrise Vulnhub Walkthrough 00:05:51
  77. 77 | OWASP CSRF Vulnerability Code Review [26] 00:16:11
  78. 78 | SQL and XSS Vulnerability Code Review [25] 00:04:19
  79. 79 | Reflected Cross Site Scripting PHP Code Review [24] 00:07:52
  80. 80 | PHP command Injection Vulnerability Code review [23] 00:07:44
  81. 81 | SQL Injection PHP Code Review [22] 00:11:00
  82. 82 | Practical Web Application Pentesting - Red Team Training - Nezuko CTF vulnhub 00:16:02
  83. 83 | OWASP Local File Inclusion Vulnerability - Prime 1 Vulnhub CTF Walkthrough 00:10:25
  84. 84 | BsidesTLV 2018 Vulnhub CTF Walkthrough - IH8emacs 00:09:10
  85. 85 | BsidesTLV 2018 CTF Vulnhub Walkthrough - Redirect Me 00:15:12
  86. 86 | Insecure Direct Object Reference Vulnerability - OWASP 00:12:20
  87. 87 | Cookie Security Explained OWASP Top 10 00:11:08
  88. 88 | OWASP Stored XSS - Practical Approach - Penetration Testing and Cybersecurity Training 00:12:15
  89. 89 | Practical Reflected XSS - Owasp Cross Site Scripting 00:11:37
  90. 90 | HTML Forms Injection Explained EP1 OWASP Hackademic Challenge 10 00:04:36
  91. 91 | Practical Command Injection with Burp Suite EP2 OWASP Hackademic Challenge 008 00:04:10
  92. 92 | Directory Traversal With Burp Suite EP1 OWASP Hackademic Challenge 007 00:06:47
  93. 93 | Playing with Javescript Functions OWASP Hackademic Challenge 006 00:03:40
  94. 94 | User Agent Spoofing Explained EP1 OWASP Hackademic Challenge 5 00:02:58
  95. 95 | Practical Encoded Reflected XSS EP3 OWASP Hackademic Challenge 004 00:05:09
  96. 96 | Reflected Cross Site Scripting EP2 OWASP Hackademic Challenge 003 00:03:04
  97. 97 | Playing with Javascript Methods OWASP Hackademic Challenge 002 00:06:48
  98. 98 | Directory Browsing Vulenrability and Spidering Explained OWASP Hackademic Challenge 001 00:06:42
  99. 99 | XPATH Injection Vulnerability Explained OWASP WebGoat 00:04:26
  100. 100 | Session Fixation Attack Explained OWASP WebGoat 00:07:26
  101. 101 | Client-side Validation (CSV) Bypass Explained OWASP WebGoat 00:10:35
  102. 102 | XML External Entity Injection Explained EP1 OWASP WebGoat 00:05:57
  103. 103 | String SQL Injection Vulnerability Explained EP3 OWASP WebGoat 00:04:06
  104. 104 | Numeric SQL Injection Vulnerability Explained EP2 OWASP Webgoat Lab 00:04:05
  105. 105 | SQL Injection Vulnerability Explained EP1 OWASP WebGoat Lab 00:10:01
  106. 106 | Command Injection Vulnerability Explained EP1 Mutillidae OWASP Lab 00:11:51
  107. 107 | Cross Site Request Forgery CSRF Vulnerability Explained EP1 DVWA Lab 00:12:06
  108. 108 | Reflected Cross Site Scripting Vulnerability Explained EP1 Mutillidae OWASP Lab 00:05:25
  109. 109 | Stored Cross Site Scripting XSS Vulnerability Explained EP2 Mutillidae Lab 00:12:24
  110. 110 | Insecure Direct Object Reference Vulnerability Explained EP1 Mutillidae OWASP Lab 00:06:22
  111. 111 | Local File Inclusion Vulnerability Explained EP1 Mutillidae OWASP Lab 00:03:42
  112. 112 | Unrestricted File Upload Vulnerability P1 Mutillidae OWASP Lab 00:08:30
    Student Reviews

    ( 5 Of 5 )

    1 review
    5 Stars
    100%
    4 Stars
    0%
    3 Stars
    0%
    2 Stars
    0%
    1 Star
    0%
    Y
    Youtube

    29-07-2024
    Web Application Pentesting Course

    This playlist is updated regularly to be a repository for web application penetration testing challenges and solutions or walkthroughs.