Never stop talking " STOP the Gaza Genocide "

Web PenTesting | Motasem Hamdan

Motasem Hamdan

Motasem Hamdan

Motasem Hamdan is a content creator, instructor, swimmer and entrepreneur who creates cyber security training videos and articles, provides marketing consultancy and writes research papers in healthcare cyber security.. Motasem also owns the masterminds group which is a group of authors who create study notes, book summaries and courses in cyber security, IT, health and fitness, business and money and digital marketing.. Instagram: https://www.instagram.com/mastermindstudynotes/. Website:

Course Details

Course Lessons

  1. 1 | File Inclusion Vulnerability Explained TryHackMe Junior Penetration Tester OSCP 00:33:40
  2. 2 | From Local File Inclusion to Remote Shell OSCP Video Course Prep 00:20:37
  3. 3 | Web Application Vulnerability Scanning with OWASP ZAP TryHackMe 00:20:20
  4. 4 | SQL Injection Vulnerability Explained TryHackMe Junior Penetration Tester OSCP 00:46:09
  5. 5 | Cross Site Scripting XSS Explained TryHackMe Junior Penetration Tester OSCP 00:26:38
  6. 6 | Cookie Security Explained OWASP Top 10 00:11:08
  7. 7 | Complete Guide to BurpSuite Intruder TryHackMe Junior Penetration Tester 00:47:38
  8. 8 | Broken Authentication and SQL Injection OWASP Juice Shop TryHackMe 00:13:43
  9. 9 | Command Injection Vulnerability Explained TryHackMe OWASP TOP 10 Walkthrough 00:12:20
  10. 10 | Command Injection Vulnerability Explained TryHackMe Junior Penetration Tester 00:12:13
  11. 11 | Web Application Content Enumeration TryHackMe Content Discovery 00:30:28
  12. 12 | Insecure Direct Object Reference Vulnerability Explained (IDOR) TryHackMe IDOR 00:10:22
  13. 13 | Bypassing Server Side Upload Filters P6 Upload Vulnerabilities TryHackMe 00:14:48
  14. 14 | Ultimate Guide to Manual SQL Injection Testing DVWA Training 00:35:56
  15. 15 | Understanding SSRF : Server Side Request Forgery Vulnerability TryHackMe 00:13:46
  16. 16 | Finding Security Misconfigurations in a Website - COMPTIA Pentest+ TryHackMe OWASP Top 10 00:16:48
  17. 17 | Explaining Insecure Deserialization Vulnerability - COMPTIA Pentest+ TryHackMe OWASP 00:15:36
  18. 18 | Understanding JSON Web Token Vulnerabilities TryHackMe 00:11:52
  19. 19 | Grabbing Cookies With Stored Cross Site Scripting (Testing Scenario ) - TryHackMe 00:33:56
  20. 20 | Demonstrating Cross Site Scripting Filter Bypass Techniques TryHackMe 00:13:24
  21. 21 | Unrestricted File Upload Vulnerability P1 Mutillidae OWASP Lab 00:08:30
  22. 22 | Numeric SQL Injection Vulnerability Explained EP2 OWASP Webgoat Lab 00:04:05
  23. 23 | Practical Web Application Pentesting - Red Team Training - Nezuko CTF vulnhub 00:16:02
  24. 24 | XML External Entity Injection Explained EP1 OWASP WebGoat 00:05:57
  25. 25 | String SQL Injection Vulnerability Explained EP3 OWASP WebGoat 00:04:06
  26. 26 | Reflected Cross Site Scripting Vulnerability Explained EP1 Mutillidae OWASP Lab 00:05:25
  27. 27 | Understanding Local File Inclusion Vulnerability TryHackmMe LFI 00:13:12
  28. 28 | XPATH Injection Vulnerability Explained OWASP WebGoat 00:04:26
  29. 29 | Practical Reflected XSS - Owasp Cross Site Scripting 00:11:37
  30. 30 | Local File Inclusion & Log Poisoning Explained HackTheBox Toxic 00:14:23
  31. 31 | BWAPP - Part 2 : HTML Injection 00:21:01
  32. 32 | Session Fixation Attack Explained OWASP WebGoat 00:07:26
  33. 33 | Finding Sensitive Data in a Website - COMPTIA Pentest+ TryHackMe OWASP 00:11:35
  34. 34 | Testing For SQL Injection Database Vulnerability in search fields - bWAPP 00:24:42
  35. 35 | OWASP Stored XSS - Practical Approach - Penetration Testing and Cybersecurity Training 00:12:15
  36. 36 | Directory Browsing Vulenrability and Spidering Explained OWASP Hackademic Challenge 001 00:06:42
  37. 37 | Server Side Template Injection Vulnerability Explained TryHackMe SSTI 00:18:50
  38. 38 | XML External Entity Vulnerability To SSH Shell TryHackMe 00:13:06
  39. 39 | SQL Injection Vulnerability Explained EP1 OWASP WebGoat Lab 00:10:01
  40. 40 | PHP command Injection Vulnerability Code review [23] 00:07:44
  41. 41 | Local File Inclusion Vulnerability Explained EP1 Mutillidae OWASP Lab 00:03:42
  42. 42 | Basic Penetration Testing Tools TryHackMe ToolsRus 00:15:28
  43. 43 | bWAPP - Part 3: IFrame Injection 00:10:11
  44. 44 | Broken Authentication OWASP Top 10 TryHackMe Overpass 00:22:23
  45. 45 | Stored Cross Site Scripting XSS Vulnerability Explained EP2 Mutillidae Lab 00:12:24
  46. 46 | Insecure Direct Object Reference Vulnerability Explained EP1 Mutillidae OWASP Lab 00:06:22
  47. 47 | What is Blind XSS & How Hackers Use it to Steal Your Browser Cookies? 00:12:24
  48. 48 | Analyzing Logs and Exploiting PHP Book Store - TryHackMe OWASP Top 10 00:10:51
  49. 49 | bWAPP - Part 5: Mail Header Injection 00:11:31
  50. 50 | XXE and JSON Web Tokens Vulnerabilities TryHackMe ZTH: Obscure Web Vulns 00:14:03
  51. 51 | Web Application Firewall Evasion CTF Walkthrough 00:23:49
  52. 52 | How Can XSS Be Used to Access Sensitive Files TryHackMe The Sticker Shop 00:17:46
  53. 53 | Local File Inclusion in Node.js TryHackMe Advent of Cyber 1 Day 15 00:15:05
  54. 54 | Demonstrating Web Application Vulnerabilities - Cyberseclabs Shock 00:15:38
  55. 55 | Understanding The Bypass Of File Upload Extension Filters P10 TryHackMe Opacity 00:21:12
  56. 56 | SQL Injection PHP Code Review [22] 00:11:00
  57. 57 | Exposing Sensitive Data and Viewing other users shopping carts - OWASP Juice Shop TyHackMe 00:15:44
  58. 58 | OWASP Directory Traversal - Sunrise Vulnhub Walkthrough 00:05:51
  59. 59 | Explaining XML vulnerabilities [Owasp] - COMPTIA Pentest+ Course Preparation TryHackMe 00:13:46
  60. 60 | Understanding Server Side Template Injection TryHackMe 00:20:15
  61. 61 | IFrame and HTML Injection TryHackMe MD2PDF 00:09:18
  62. 62 | Security Testing Techniques For Authentication Mechanisms TryHackMe 00:19:20
  63. 63 | Client-side Validation (CSV) Bypass Explained OWASP WebGoat 00:10:35
  64. 64 | SQL and XSS Vulnerability Code Review [25] 00:04:19
  65. 65 | Understanding Cookies Security TryHackMe Advent of Cyber 00:09:45
  66. 66 | Command Injection Vulnerability Explained EP1 Mutillidae OWASP Lab 00:11:51
  67. 67 | How Can Stored XSS Vulnerability Lead to Cookie Stealing? Practical Training Scenario 00:12:28
  68. 68 | Practical Command Injection with Burp Suite EP2 OWASP Hackademic Challenge 008 00:04:10
  69. 69 | Using Burp Suite for Session Hijacking OverTheWire Natas Level 17-18 00:10:09
  70. 70 | Python Pickle Exploitation CTF Walkthrough 00:20:45
  71. 71 | Intro to Web Application Security TryHackMe Introduction to Cyber Security Path 00:22:32
  72. 72 | Reflected Cross Site Scripting EP2 OWASP Hackademic Challenge 003 00:03:04
  73. 73 | Fuzzing Web Applications with Wfuzz CTF Walkthrough 00:15:39
  74. 74 | Demonstrating PHP Filters Bypass For Local File Inclusion - TryHackMe DogCat 00:39:03
  75. 75 | HTML Forms Injection Explained EP1 OWASP Hackademic Challenge 10 00:04:36
  76. 76 | Finding Users Cookies with Reflective Cross Site Scripting - TryHackMe COMPTIA Pentest+ Pathway 00:10:12
  77. 77 | Penetration Testing Series - Part9: Testing For PHP Command Injection 00:07:53
  78. 78 | NoSQL Injection Attack Explained TryHackMe NoSQL Injection 00:32:45
  79. 79 | OWASP CSRF Vulnerability Code Review [26] 00:16:11
  80. 80 | Practical Encoded Reflected XSS EP3 OWASP Hackademic Challenge 004 00:05:09
  81. 81 | Directory Traversal With Burp Suite EP1 OWASP Hackademic Challenge 007 00:06:47
  82. 82 | CGI and Tomcat Security Testing with Metasploit Advent of Cyber 00:16:24
  83. 83 | OWASP Local File Inclusion Vulnerability - Prime 1 Vulnhub CTF Walkthrough 00:10:25
  84. 84 | Demonstrating XSS,RCE and PostgreSQL Exploitation HackTheBox RedCross 00:23:46
  85. 85 | Session ID Hijacking With Python OverTheWire Natas 18-19 00:13:04
  86. 86 | Server Side Request Forgery Simple Demonstration TryHackMe Surf 00:11:19
  87. 87 | Playing with Javascript Methods OWASP Hackademic Challenge 002 00:06:48
  88. 88 | OWASP TOP 10 API Vulnerabilities Explained Part Two TryHackMe 00:16:23
  89. 89 | User Agent Spoofing Explained EP1 OWASP Hackademic Challenge 5 00:02:58
  90. 90 | PHP Static-Eval Exploitation CTF Walkthrough 00:15:17
  91. 91 | SQL Injection Bypassing Double Quotes OverTheWire Natas Level 14 00:14:00
  92. 92 | Penetration Testing Series - Part:7 - OS Command Injection 00:10:39
  93. 93 | Blind SQL Injection With Python OverTheWire Natas Level 15 00:12:29
  94. 94 | Understanding Fuzzing in Cybersecurity TryHackMe Advent of Cyber 00:15:49
  95. 95 | How to Use SQLmap to Test for SQL Injection Vulnerability Full Tutorial 00:22:19
  96. 96 | Understanding Insecure Direct Object Reference Vulnerability TryHackMe ZTH: Web 2 00:09:44
  97. 97 | Insecure Direct Object Reference Vulnerability - OWASP 00:12:20
  98. 98 | Re-Visiting File Upload Vulnerabilities P8 TryHackMe Advent of Cyber 00:15:42
  99. 99 | OWASP Top 10 API Vulnerabilities Explained Part Four TryHackMe 00:14:18
  100. 100 | Reflected Cross Site Scripting PHP Code Review [24] 00:07:52
  101. 101 | Docker Privilege Escalation and SSTI Exploitation CTF Walkthrough 00:30:25
  102. 102 | Bypassing SQL Filters Using Command Substitution OverTheWire Natas Level 15-16 00:12:46
  103. 103 | OWASP Top 10 API Vulnerabilities Explained Part 3 TryHackMe 00:13:37
  104. 104 | BsidesTLV 2018 CTF Vulnhub Walkthrough - Redirect Me 00:15:12
  105. 105 | Web Hacking 101 with PicoCTF CTF Walkthrough 00:50:42
  106. 106 | Anatomy and Analysis of SQL Injection TryHackMe Advent of Cyber 00:20:55
  107. 107 | Time Based SQL Injection OverTheWire Natas Level 16-17 00:12:17
  108. 108 | PHP Session Hijacking With XOR Encryption OverTheWire War Games Natas Level 11 00:11:47
  109. 109 | Cross Site Request Forgery CSRF Vulnerability Explained EP1 DVWA Lab 00:12:06
  110. 110 | File Upload Vulnerabilities P11 OverTheWire Natas Level 12-13 00:12:04
  111. 111 | Coding in Cybersecurity: Beyond the Tools and Scanners HackTheBox Coding Challenges 00:14:20
  112. 112 | Fingerprinting and Detecting Web Application Firewalls 00:13:15
  113. 113 | File Upload Vulnerabilities P12 OverTheWire Natas 13 00:08:58
  114. 114 | BsidesTLV 2018 Vulnhub CTF Walkthrough - IH8emacs 00:09:10
  115. 115 | Playing with Javescript Functions OWASP Hackademic Challenge 006 00:03:40
  116. 116 | Penetration testing series - Part10: Cyberseclabs CMS walkthrough 00:16:07
  117. 117 | XML External Entity Injection [113] - OWASP 00:08:19
  118. 118 | XML External Entity Injection TryHackMe Advent of Cyber Day 5 Walkthrough 00:15:14
  119. 119 | Web Application Basics for Hackers TryHackMe Walkthrough 00:39:15
    Student Reviews

    ( 5 Of 5 )

    1 review
    5 Stars
    100%
    4 Stars
    0%
    3 Stars
    0%
    2 Stars
    0%
    1 Star
    0%
    Y
    Youtube

    29-07-2024
    Bug Bounty & Web Hacking Course

    This playlist is updated regularly to be a repository for web application penetration testing challenges and solutions. Useful if you are preparing for certifications such as HTB buh bounty hunter, THM junior penetration tester, OSCP and HTB CPTS