Companies Home Search Profile

OpSecX - WebSecNinja - Lesser Known WebAttacks - WSN

Focused View

1:48:38

0 View
  • 1. Introduction.mp4
    01:34
  • 1. Remote Command or OS Command Injection Basics.mp4
    07:00
  • 2. Blind RCE Injection.mp4
    06:13
  • 3. RCE Techniques and Cheat Sheet.mp4
    06:12
  • 4. Bypassing RCE Filter.mp4
    02:46
  • 1. JSON Hijacking Basics.mp4
    03:24
  • 2. JSON Hijacking Demo.mp4
    04:36
  • 1. mXSS or mutation XSS .mp4
    05:25
  • 2. rPO XSS or Relative Path Overwrite XSS.mp4
    05:04
  • 1. Server Side Includes Injection Basics.mp4
    02:49
  • 2. Server Side Includes Injection Demo.mp4
    03:25
  • 1. Server Side Request Forgery Basics.mp4
    02:50
  • 2. Exploiting an SSRF Vulnerability.mp4
    07:30
  • 1. Reflected File Download (RFD) Theory.mp4
    08:20
  • 2. RFD Attack Explained.mp4
    12:00
  • 1. Abusing JavaScripts window.opener property Theory.mp4
    04:26
  • 2. Phishing demo by abusing window.opener property .mp4
    00:54
  • SOME Attack with Flash Callback Demo OpSecX.mp4
    08:04
  • SOME Attack with Flash Callback explained OpSecX.mp4
    05:17
  • Same Origin Method Execution Introduction OpSecX.mp4
    07:11
  • Same Origin Policy SOP OpSecX.mp4
    03:38
  • 1. Course Slides.pdf
  • 2. Source Code.rar
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 21
    • duration 1:48:38
    • Release Date 2025/01/15

    Courses related to Ethical Hacking

    Subtitle
    Reconnaissance with Sn1per
    Pluralsight Ricardo Reimao
    Ricardo Reimao
    Reconnaissance with Sn1per
    19:09
    English subtitles
    04/18/2023
    Subtitle
    Ethical Hacking: Scanning Networks
    Subtitle
    Ethical Hacking: Windows Exploitation Basics