Skip to content

Instantly share code, notes, and snippets.

@OTaKuHP
Created July 11, 2021 03:59
Show Gist options
  • Save OTaKuHP/8ec29bb2e5eccdb0614fba2c4d2a6f8f to your computer and use it in GitHub Desktop.
Save OTaKuHP/8ec29bb2e5eccdb0614fba2c4d2a6f8f to your computer and use it in GitHub Desktop.

webapp pentest path yt videos

  • Phase 1 – History
  1. History of Internet - https://www.youtube.com/watch?v=9hIQjrMHTv4
  • Phase 2 – Web and Server Technology
  1. Basic concepts of web applications, how they work and the HTTP protocol - https://www.youtube.com/watch?v=RsQ1tFLwldY&t=7s
  2. HTML basics part 1 - https://www.youtube.com/watch?v=p6fRBGI_BY0
  3. HTML basics part 2 - https://www.youtube.com/watch?v=Zs6lzuBVK2w
  4. Difference between static and dynamic website - https://www.youtube.com/watch?v=hlg6q6OFoxQ
  5. HTTP protocol Understanding - https://www.youtube.com/watch?v=JFZMyhRTVt0
  6. Parts of HTTP Request -https://www.youtube.com/watch?v=pHFWGN-upGM
  7. Parts of HTTP Response - https://www.youtube.com/watch?v=c9sMNc2PrMU
  8. Various HTTP Methods - https://www.youtube.com/watch?v=PO7D20HsFsY
  9. Understanding URLS - https://www.youtube.com/watch?v=5Jr-_Za5yQM
  10. Intro to REST - https://www.youtube.com/watch?v=YCcAE2SCQ6k
  11. HTTP Request & Response Headers - https://www.youtube.com/watch?v=vAuZwirKjWs
  12. What is a cookie - https://www.youtube.com/watch?v=I01XMRo2ESg
  13. HTTP Status codes - https://www.youtube.com/watch?v=VLH3FMQ5BIQ
  14. HTTP Proxy - https://www.youtube.com/watch?v=qU0PVSJCKcs
  15. Authentication with HTTP - https://www.youtube.com/watch?v=GxiFXUFKo1M
  16. HTTP basic and digest authentication - https://www.youtube.com/watch?v=GOnhCbDhMzk
  17. What is “Server-Side” - https://www.youtube.com/watch?v=JnCLmLO9LhA
  18. Server and client side with example - https://www.youtube.com/watch?v=DcBB2Fp8WNI
  19. What is a session - https://www.youtube.com/watch?v=WV4DJ6b0jhg&t=202s
  20. Introduction to UTF-8 and Unicode - https://www.youtube.com/watch?v=sqPTR_v4qFA
  21. URL encoding - https://www.youtube.com/watch?v=Z3udiqgW1VA
  22. HTML encoding - https://www.youtube.com/watch?v=IiAfCLWpgII&t=109s
  23. Base64 encoding - https://www.youtube.com/watch?v=8qkxeZmKmOY
  24. Hex encoding & ASCII - https://www.youtube.com/watch?v=WW2SaCMnHdU
  • Phase 3 – Setting up the lab with BurpSuite and bWAPP MANISH AGRAWAL
  1. Setup lab with bWAPP - https://www.youtube.com/watch?v=dwtUn3giwTk&index=1&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV
  2. Set up Burp Suite - https://www.youtube.com/watch?v=hQsT4rSa_v0&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV&index=2
  3. Configure Firefox and add certificate - https://www.youtube.com/watch?v=hfsdJ69GSV4&index=3&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV
  4. Mapping and scoping website - https://www.youtube.com/watch?v=H-_iVteMDRo&index=4&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV
  5. Spidering - https://www.youtube.com/watch?v=97uMUQGIe14&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV&index=5
  6. Active and passive scanning - https://www.youtube.com/watch?v=1Mjom6AcFyU&index=6&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV
  7. Scanner options and demo - https://www.youtube.com/watch?v=gANi4Kt7-ek&index=7&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV
  8. Introduction to password security - https://www.youtube.com/watch?v=FwcUhcLO9iM&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV&index=8
  9. Intruder - https://www.youtube.com/watch?v=wtMg9oEMTa8&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV&index=9
  10. Intruder attack types - https://www.youtube.com/watch?v=N5ndYPwddkQ&index=10&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV
  11. Payload settings - https://www.youtube.com/watch?v=5GpdlbtL-1Q&index=11&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV
  12. Intruder settings - https://www.youtube.com/watch?v=B_Mu7jmOYnU&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV&index=12 ÆTHER SECURITY LAB
  13. No.1 Penetration testing tool - https://www.youtube.com/watch?v=AVzC7ETqpDo&list=PLq9n8iqQJFDrwFe9AEDBlR1uSHEN7egQA&index=1
  14. Environment Setup - https://www.youtube.com/watch?v=yqnUOdr0eVk&index=2&list=PLq9n8iqQJFDrwFe9AEDBlR1uSHEN7egQA
  15. General concept - https://www.youtube.com/watch?v=udl4oqr_ylM&list=PLq9n8iqQJFDrwFe9AEDBlR1uSHEN7egQA&index=3
  16. Proxy module - https://www.youtube.com/watch?v=PDTwYFkjQBE&list=PLq9n8iqQJFDrwFe9AEDBlR1uSHEN7egQA&index=4
  17. Repeater module - https://www.youtube.com/watch?v=9Zh_7s5csCc&list=PLq9n8iqQJFDrwFe9AEDBlR1uSHEN7egQA&index=5
  18. Target and spider module - https://www.youtube.com/watch?v=dCKPZUSOlr8&list=PLq9n8iqQJFDrwFe9AEDBlR1uSHEN7egQA&index=6
  19. Sequencer and scanner module - https://www.youtube.com/watch?v=G-v581pXerE&list=PLq9n8iqQJFDrwFe9AEDBlR1uSHEN7egQA&index=7
  • Phase 4 – Mapping the application and attack surface
  1. Spidering - https://www.youtube.com/watch?v=97uMUQGIe14&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YGzV&index=5
  2. Mapping application using robots.txt - https://www.youtube.com/watch?v=akuzgZ75zrk
  3. Discover hidden contents using dirbuster - https://www.youtube.com/watch?v=--nu9Jq07gA
  4. Dirbuster in detail - https://www.youtube.com/watch?v=2tOQC68hAcQ
  5. Discover hidden directories and files with intruder - https://www.youtube.com/watch?v=4Fz9mJeMNkI
  6. Directory bruteforcing 1 - https://www.youtube.com/watch?v=ch2onB_LFoI
  7. Directory bruteforcing 2 - https://www.youtube.com/watch?v=ASMW_oLbyIg
  8. Identify application entry points - https://www.youtube.com/watch?v=IgJWPZ2OKO8&t=34s
  9. Identify application entry points - https://www.owasp.org/index.php/Identify_application_entry_points_(OTG-INFO-006)
  10. Identify client and server technology - https://www.youtube.com/watch?v=B8jN_iWjtyM55. Identify server technology using banner grabbing (telnet) - https://www.youtube.com/watch?v=O67M-U2UOAg
  11. Identify server technology using httprecon - https://www.youtube.com/watch?v=xBBHtS-dwsM
  12. Pentesting with Google dorks Introduction - https://www.youtube.com/watch?v=NmdrKFwAw9U
  13. Fingerprinting web server - https://www.youtube.com/watch?v=tw2VdG0t5kc&list=PLxLRoXCDIalcRS5Nb1I_HM_OzS10E6lqp&index=10
  14. Use Nmap for fingerprinting web server - https://www.youtube.com/watch?v=VQV-y_-AN80
  15. Review webs servers metafiles for information leakage - https://www.youtube.com/watch?v=sds3Zotf_ZY
  16. Enumerate applications on web server - https://www.youtube.com/watch?v=lfhvvTLN60E
  17. Identify application entry points - https://www.youtube.com/watch?v=97uMUQGIe14&list=PLDeogY2Qr-tGR2NL2X1AR5Zz9t1iaWwlM
  18. Map execution path through application - https://www.youtube.com/watch?v=0I0NPiyo9UI
  19. Fingerprint web application frameworks - https://www.youtube.com/watch?v=ASzG0kBoE4c
  • Phase 5 – Understanding and exploiting OWASP top 10 vulnerabilities
  1. A closer look at all owasp top 10 vulnerabilities - https://www.youtube.com/watch?v=avFR_Af0KGk IBM
  2. Injection - https://www.youtube.com/watch?v=02mLrFVzIYU&index=1&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d
  3. Broken authentication and session management - https://www.youtube.com/watch?v=iX49fqZ8HGA&index=2&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d
  4. Cross-site scripting - https://www.youtube.com/watch?v=x6I5fCupLLU&index=3&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d
  5. Insecure direct object reference - https://www.youtube.com/watch?v=-iCyp9Qz3CI&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d&index=4
  6. Security misconfiguration - https://www.youtube.com/watch?v=cIplXL8idyo&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d&index=5
  7. Sensitive data exposure - https://www.youtube.com/watch?v=rYlzTQlF8Ws&index=6&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d
  8. Missing functional level access controls - https://www.youtube.com/watch?v=VMv_gyCNGpk&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d&index=7
  9. Cross-site request forgery - https://www.youtube.com/watch?v=_xSFm3KGxh0&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d&index=8
  10. Using components with known vulnerabilities - https://www.youtube.com/watch?v=bhJmVBJ-F-4&index=9&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d
  11. Unvalidated redirects and forwards - https://www.youtube.com/watch?v=L6bYKiLtSL8&index=10&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d F5 CENTRAL
  12. Injection - https://www.youtube.com/watch?v=rWHvp7rUka8&index=1&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD
  13. Broken authentication and session management - https://www.youtube.com/watch?v=mruO75ONWy8&index=2&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD
  14. Insecure deserialisation - https://www.youtube.com/watch?v=nkTBwbnfesQ&index=8&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD
  15. Sensitive data exposure - https://www.youtube.com/watch?v=2RKbacrkUBU&index=3&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD
  16. Broken access control - https://www.youtube.com/watch?v=P38at6Tp8Ms&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD&index=5
  17. Insufficient logging and monitoring - https://www.youtube.com/watch?v=IFF3tkUOF5E&index=10&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD82. XML external entities - https://www.youtube.com/watch?v=g2ey7ry8_CQ&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD&index=4
  18. Using components with known vulnerabilities - https://www.youtube.com/watch?v=IGsNYVDKRV0&index=9&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD
  19. Cross-site scripting - https://www.youtube.com/watch?v=IuzU4y-UjLw&index=7&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD
  20. Security misconfiguration - https://www.youtube.com/watch?v=JuGSUMtKTPU&index=6&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD LUKE BRINER
  21. Injection explained - https://www.youtube.com/watch?v=1qMggPJpRXM&index=1&list=PLpNYlUeSK_rkrrBox-xvSkm5lgaDqKa0X
  22. Broken authentication and session management - https://www.youtube.com/watch?v=fKnG15BL4AY&list=PLpNYlUeSK_rkrrBox-xvSkm5lgaDqKa0X&index=2
  23. Cross-site scripting - https://www.youtube.com/watch?v=ksM-xXeDUNs&index=3&list=PLpNYlUeSK_rkrrBox-xvSkm5lgaDqKa0X
  24. Insecure direct object reference - https://www.youtube.com/watch?v=ZodA76-CB10&list=PLpNYlUeSK_rkrrBox-xvSkm5lgaDqKa0X&index=4
  25. Security misconfiguration - https://www.youtube.com/watch?v=DfFPHKPCofY&index=5&list=PLpNYlUeSK_rkrrBox-xvSkm5lgaDqKa0X
  26. Sensitive data exposure - https://www.youtube.com/watch?v=Z7hafbGDVEE&list=PLpNYlUeSK_rkrrBox-xvSkm5lgaDqKa0X&index=6
  27. Missing functional level access control - https://www.youtube.com/watch?v=RGN3w831Elo&list=PLpNYlUeSK_rkrrBox-xvSkm5lgaDqKa0X&index=7
  28. Cross-site request forgery - https://www.youtube.com/watch?v=XRW_US5BCxk&list=PLpNYlUeSK_rkrrBox-xvSkm5lgaDqKa0X&index=8
  29. Components with known vulnerabilities - https://www.youtube.com/watch?v=pbvDW9pJdng&list=PLpNYlUeSK_rkrrBox-xvSkm5lgaDqKa0X&index=9
  30. Unvalidated redirects and forwards - https://www.youtube.com/watch?v=bHTglpgC5Qg&list=PLpNYlUeSK_rkrrBox-xvSkm5lgaDqKa0X&index=10
  • Phase 6 – Session management testing
  1. Bypass authentication using cookie manipulation - https://www.youtube.com/watch?v=mEbmturLljU
  2. Cookie Security Via httponly and secure Flag - OWASP - https://www.youtube.com/watch?v=3aKA4RkAg78
  3. Penetration testing Cookies basic - https://www.youtube.com/watch?v=_P7KN8T1boc
  4. Session fixation 1 - https://www.youtube.com/watch?v=ucmgeHKtxaI
  5. Session fixation 2 - https://www.youtube.com/watch?v=0Tu1qxysWOk
  6. Session fixation 3 - https://www.youtube.com/watch?v=jxwgpWvRUSo
  7. Session fixation 4 - https://www.youtube.com/watch?v=eUbtW0Z0W1g
  8. CSRF - Cross site request forgery 1 - https://www.youtube.com/watch?v=m0EHlfTgGUU
  9. CSRF - Cross site request forgery 2 - https://www.youtube.com/watch?v=H3iu0_ltcv4
  10. CSRF - Cross site request forgery 3 - https://www.youtube.com/watch?v=1NO4I28J-0s
  11. CSRF - Cross site request forgery 4 - https://www.youtube.com/watch?v=XdEJEUJ0Fr8
  12. CSRF - Cross site request forgery 5 - https://www.youtube.com/watch?v=TwG0Rd0hr18
  13. Session puzzling 1 - https://www.youtube.com/watch?v=YEOvmhTb8xA
  14. Admin bypass using session hijacking - https://www.youtube.com/watch?v=1wp1o-1TfAc
  • Phase 7 – Bypassing client-side controls
  1. What is hidden forms in HTML - https://www.youtube.com/watch?v=orUoGsgaYAE
  2. Bypassing hidden form fields using tamper data - https://www.youtube.com/watch?v=NXkGX2sPw7I
  3. Bypassing hidden form fields using Burp Suite (Purchase application) - https://www.youtube.com/watch?v=xahvJyUFTfM
  4. Changing price on eCommerce website using parameter tampering - https://www.youtube.com/watch?v=A-ccNpP06Zg
  5. Understanding cookie in detail - https://www.youtube.com/watch?v=_P7KN8T1boc&list=PLWPirh4EWFpESKWJmrgQwmsnTrL_K93Wi&index=18
  6. Cookie tampering with tamper data- https://www.youtube.com/watch?v=NgKXm0lBecc
  7. Cookie tamper part 2 - https://www.youtube.com/watch?v=dTCt_I2DWgo
  8. Understanding referer header in depth using Cisco product - https://www.youtube.com/watch?v=GkQnBa3C7WI&t=35s
  9. Introduction to ASP.NET viewstate - https://www.youtube.com/watch?v=L3p6Uw6SSXs
  10. ASP.NET viewstate in depth - https://www.youtube.com/watch?v=Fn_08JLsrmY
  11. Analyse sensitive data in ASP.NET viewstate - https://msdn.microsoft.com/en-us/library/ms972427.aspx?f=255&MSPPError=-2147217396
  12. Cross-origin-resource-sharing explanation with example - https://www.youtube.com/watch?v=Ka8vG5miErk
  13. CORS demo 1 - https://www.youtube.com/watch?v=wR8pjTWaEbs
  14. CORS demo 2 - https://www.youtube.com/watch?v=lg31RYYG-T4
  15. Security headers - https://www.youtube.com/watch?v=TNlcoYLIGFk
  16. Security headers 2 - https://www.youtube.com/watch?v=ZZUvmVkkKu4
  • Phase 8 – Attacking authentication/login
  1. Attacking login panel with bad password - Guess username password for the website and try different combinations
  2. Brute-force login panel - https://www.youtube.com/watch?v=25cazx5D_vw
  3. Username enumeration - https://www.youtube.com/watch?v=WCO7LnSlskE
  4. Username enumeration with bruteforce password attack - https://www.youtube.com/watch?v=zf3-pYJU1c4
  5. Authentication over insecure HTTP protocol - https://www.youtube.com/watch?v=ueSG7TUqoxk
  6. Authentication over insecure HTTP protocol - https://www.youtube.com/watch?v=_WQe36pZ3mA
  7. Forgot password vulnerability - case 1 - https://www.youtube.com/watch?v=FEUidWWnZwU
  8. Forgot password vulnerability - case 2 - https://www.youtube.com/watch?v=j7-8YyYdWL4
  9. Login page autocomplete feature enabled - https://www.youtube.com/watch?v=XNjUfwDmHGc&t=33s
  10. Testing for weak password policy - https://www.owasp.org/index.php/Testing_for_Weak_password_policy_(OTG-AUTHN-007)
  11. Insecure distribution of credentials - When you register in any website or you request for a password reset using forgot password feature, if the website sends your username and password over the email in cleartext without sending the password reset link, then it is a vulnerability.
  12. Test for credentials transportation using SSL/TLS certificate - https://www.youtube.com/watch?v=21_IYz4npRs
  13. Basics of MySQL - https://www.youtube.com/watch?v=yPu6qV5byu4
  14. Testing browser cache - https://www.youtube.com/watch?v=2T_Xz3Humdc
  15. Bypassing login panel -case 1 - https://www.youtube.com/watch?v=TSqXkkOt6oM
  16. Bypass login panel - case 2 - https://www.youtube.com/watch?v=J6v_W-LFK1c
  • Phase 9 - Attacking access controls (IDOR, Priv esc, hidden files and directories) Completely unprotected functionalities
  1. Finding admin panel - https://www.youtube.com/watch?v=r1k2lgvK3s0
  2. Finding admin panel and hidden files and directories - https://www.youtube.com/watch?v=Z0VAPbATy1A
  3. Finding hidden webpages with dirbusater - https://www.youtube.com/watch?v=--nu9Jq07gA&t=5s Insecure direct object reference
  4. IDOR case 1 - https://www.youtube.com/watch?v=gci4R9Vkulc
  5. IDOR case 2 - https://www.youtube.com/watch?v=4DTULwuLFS0
  6. IDOR case 3 (zomato) - https://www.youtube.com/watch?v=tCJBLG5Mayo Privilege escalation
  7. What is privilege escalation - https://www.youtube.com/watch?v=80RzLSrczmc
  8. Privilege escalation - Hackme bank - case 1 - https://www.youtube.com/watch?v=g3lv__87cWM
  9. Privilege escalation - case 2 - https://www.youtube.com/watch?v=-i4O_hjc87Y
  • Phase 10 – Attacking Input validations (All injections, XSS and mics) HTTP verb tampering
  1. Introduction HTTP verb tampering - https://www.youtube.com/watch?v=Wl0PrIeAnhs
  2. HTTP verb tampering demo - https://www.youtube.com/watch?v=bZlkuiUkQzE HTTP parameter pollution
  3. Introduction HTTP parameter pollution - https://www.youtube.com/watch?v=Tosp-JyWVS4
  4. HTTP parameter pollution demo 1 - https://www.youtube.com/watch?v=QVZBl8yxVX0&t=11s
  5. HTTP parameter pollution demo 2 - https://www.youtube.com/watch?v=YRjxdw5BAM0
  6. HTTP parameter pollution demo 3 - https://www.youtube.com/watch?v=kIVefiDrWUw XSS - Cross site scripting
  7. Introduction to XSS - https://www.youtube.com/watch?v=gkMl1suyj3M158. What is XSS - https://www.youtube.com/watch?v=cbmBDiR6WaY
  8. Reflected XSS demo - https://www.youtube.com/watch?v=r79ozjCL7DA
  9. XSS attack method using burpsuite - https://www.youtube.com/watch?v=OLKBZNw3OjQ
  10. XSS filter bypass with Xenotix - https://www.youtube.com/watch?v=loZSdedJnqc
  11. Reflected XSS filter bypass 1 - https://www.youtube.com/watch?v=m5rlLgGrOVA
  12. Reflected XSS filter bypass 2 - https://www.youtube.com/watch?v=LDiXveqQ0gg
  13. Reflected XSS filter bypass 3 - https://www.youtube.com/watch?v=hb_qENFUdOk
  14. Reflected XSS filter bypass 4 - https://www.youtube.com/watch?v=Fg1qqkedGUk
  15. Reflected XSS filter bypass 5 - https://www.youtube.com/watch?v=NImym71f3Bc
  16. Reflected XSS filter bypass 6 - https://www.youtube.com/watch?v=9eGzAym2a5Q
  17. Reflected XSS filter bypass 7 - https://www.youtube.com/watch?v=ObfEI84_MtM
  18. Reflected XSS filter bypass 8 - https://www.youtube.com/watch?v=2c9xMe3VZ9Q
  19. Reflected XSS filter bypass 9 - https://www.youtube.com/watch?v=-48zknvo7LM
  20. Introduction to Stored XSS - https://www.youtube.com/watch?v=SHmQ3sQFeLE
  21. Stored XSS 1 - https://www.youtube.com/watch?v=oHIl_pCahsQ
  22. Stored XSS 2 - https://www.youtube.com/watch?v=dBTuWzX8hd0
  23. Stored XSS 3 - https://www.youtube.com/watch?v=PFG0lkMeYDc
  24. Stored XSS 4 - https://www.youtube.com/watch?v=YPUBFklUWLc
  25. Stored XSS 5 - https://www.youtube.com/watch?v=x9Zx44EV-Og SQL injection
  26. Part 1 - Install SQLi lab - https://www.youtube.com/watch?v=NJ9AA1_t1Ic&index=23&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro
  27. Part 2 - SQL lab series - https://www.youtube.com/watch?v=TA2h_kUqfhU&index=22&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro
  28. Part 3 - SQL lab series - https://www.youtube.com/watch?v=N0zAChmZIZU&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro&index=21
  29. Part 4 - SQL lab series - https://www.youtube.com/watch?v=6pVxm5mWBVU&index=20&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro
  30. Part 5 - SQL lab series - https://www.youtube.com/watch?v=0tyerVP9R98&index=19&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro
  31. Part 6 - Double query injection - https://www.youtube.com/watch?v=zaRlcPbfX4M&index=18&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro
  32. Part 7 - Double query injection cont.. - https://www.youtube.com/watch?v=9utdAPxmvaI&index=17&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro
  33. Part 8 - Blind injection boolean based - https://www.youtube.com/watch?v=u7Z7AIR6cMI&index=16&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro
  34. Part 9 - Blind injection time based - https://www.youtube.com/watch?v=gzU1YBu_838&index=15&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro
  35. Part 10 - Dumping DB using outfile - https://www.youtube.com/watch?v=ADW844OA6io&index=14&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro
  36. Part 11 - Post parameter injection error based - https://www.youtube.com/watch?v=6sQ23tqiTXY&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro&index=13
  37. Part 12 - POST parameter injection double query based - https://www.youtube.com/watch?v=tjFXWQY4LuA&index=12&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro
  38. Part 13 - POST parameter injection blind boolean and time based - https://www.youtube.com/watch?v=411G-4nH5jE&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro&index=10
  39. Part 14 - Post parameter injection in UPDATE query - https://www.youtube.com/watch?v=2FgLcPuU7Vw&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro&index=11191. Part 15 - Injection in insert query - https://www.youtube.com/watch?v=ZJiPsWxXYZs&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro&index=9
  40. Part 16 - Cookie based injection - https://www.youtube.com/watch?v=-A3vVqfP8pA&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro&index=8
  41. Part 17 - Second order injection -https://www.youtube.com/watch?v=e9pbC5BxiAE&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro&index=7
  42. Part 18 - Bypassing blacklist filters - 1 - https://www.youtube.com/watch?v=5P-knuYoDdw&index=6&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro
  43. Part 19 - Bypassing blacklist filters - 2 - https://www.youtube.com/watch?v=45BjuQFt55Y&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro&index=5
  44. Part 20 - Bypassing blacklist filters - 3 - https://www.youtube.com/watch?v=c-Pjb_zLpH0&index=4&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro
  45. Part 21 - Bypassing WAF - https://www.youtube.com/watch?v=uRDuCXFpHXc&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro&index=2
  46. Part 22 - Bypassing WAF - Impedance mismatch - https://www.youtube.com/watch?v=ygVUebdv_Ws&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro&index=3
  47. Part 23 - Bypassing addslashes - charset mismatch - https://www.youtube.com/watch?v=du-jkS6-sbo&list=PLkiAz1NPnw8qEgzS7cgVMKavvOAdogsro&index=1 NoSQL injection
  48. Introduction to NoSQL injection - https://www.youtube.com/watch?v=h0h37-Dwd_A
  49. Introduction to SQL vs NoSQL - Difference between MySQL and MongoDB with tutorial - https://www.youtube.com/watch?v=QwevGzVu_zk
  50. Abusing NoSQL databases - https://www.youtube.com/watch?v=lcO1BTNh8r8
  51. Making cry - attacking NoSQL for pentesters - https://www.youtube.com/watch?v=NgsesuLpyOg Xpath and XML injection
  52. Introduction to Xpath injection - https://www.youtube.com/watch?v=2_UyM6Ea0Yk&t=3102s
  53. Introduction to XML injection - https://www.youtube.com/watch?v=9ZokuRHo-eY
  54. Practical 1 - bWAPP - https://www.youtube.com/watch?v=6tV8EuaHI9M
  55. Practical 2 - Mutillidae - https://www.youtube.com/watch?v=fV0qsqcScI4
  56. Practical 3 - webgoat - https://www.youtube.com/watch?v=5ZDSPVp1TpM
  57. Hack admin panel using Xpath injection - https://www.youtube.com/watch?v=vvlyYlXuVxI
  58. XXE demo - https://www.youtube.com/watch?v=3B8QhyrEXlU
  59. XXE demo 2 - https://www.youtube.com/watch?v=UQjxvEwyUUw
  60. XXE demo 3 - https://www.youtube.com/watch?v=JI0daBHq6fA LDAP injection
  61. Introduction and practical 1 - https://www.youtube.com/watch?v=-TXFlg7S9ks
  62. Practical 2 - https://www.youtube.com/watch?v=wtahzm_R8e4 OS command injection
  63. OS command injection in bWAPP - https://www.youtube.com/watch?v=qLIkGJrMY9k
  64. bWAAP- OS command injection with Commiux (All levels) - https://www.youtube.com/watch?v=5-1QLbVa8YE Local file inclusion
  65. Detailed introduction - https://www.youtube.com/watch?v=kcojXEwolIs
  66. LFI demo 1 - https://www.youtube.com/watch?v=54hSHpVoz7A219. LFI demo 2 - https://www.youtube.com/watch?v=qPq9hIVtitI Remote file inclusion
  67. Detailed introduction - https://www.youtube.com/watch?v=MZjORTEwpaw
  68. RFI demo 1 - https://www.youtube.com/watch?v=gWt9A6eOkq0
  69. RFI introduction and demo 2 - https://www.youtube.com/watch?v=htTEfokaKsM HTTP splitting/smuggling
  70. Detailed introduction - https://www.youtube.com/watch?v=bVaZWHrfiPw
  71. Demo 1 - https://www.youtube.com/watch?v=mOf4H1aLii
  • Phase 11 – Generating and testing error codes
  1. Generating normal error codes by visiting files that may not exist on the server - for example visit chintan.php or chintan.aspx file on any website and it may redirect you to 404.php or 404.aspx or their customer error page. Check if an error page is generated by default web server or application framework or a custom page is displayed which does not display any sensitive information.
  2. Use BurpSuite fuzzing techniques to generate stack trace error codes - https://www.youtube.com/watch?v=LDF6OkcvBzM
  • Phase 12 – Weak cryptography testing
  1. SSL/TLS weak configuration explained - https://www.youtube.com/watch?v=Rp3iZUvXWlM
  2. Testing weak SSL/TLS ciphers - https://www.youtube.com/watch?v=slbwCMHqCkc
  3. Test SSL/TLS security with Qualys guard - https://www.youtube.com/watch?v=Na8KxqmETnw
  4. Sensitive information sent via unencrypted channels - https://www.youtube.com/watch?v=21_IYz4npR
  • Phase 12 – Business logic vulnerability
  1. What is a business logic flaw - https://www.youtube.com/watch?v=ICbvQzva6lE&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI
  2. The Difficulties Finding Business Logic Vulnerabilities with Traditional Security Tools - https://www.youtube.com/watch?v=JTMg0bhkUbo&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=2
  3. How To Identify Business Logic Flaws - https://www.youtube.com/watch?v=FJcgfLM4SAY&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=3
  4. Business Logic Flaws: Attacker Mindset - https://www.youtube.com/watch?v=Svxh9KSTL3Y&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=4
  5. Business Logic Flaws: Dos Attack On Resource - https://www.youtube.com/watch?v=4S6HWzhmXQk&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=5
  6. Business Logic Flaws: Abuse Cases: Information Disclosure - https://www.youtube.com/watch?v=HrHdUEUwMHk&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=6237. Business Logic Flaws: Abuse Cases: iPod Repairman Dupes Apple - https://www.youtube.com/watch?v=8yB_ApVsdhA&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=7
  7. Business Logic Flaws: Abuse Cases: Online Auction - https://www.youtube.com/watch?v=oa_UICCqfbY&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=8
  8. Business Logic Flaws: How To Navigate Code Using ShiftLeft Ocular - https://www.youtube.com/watch?v=hz7IZu6H6oE&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=9
  9. Business Logic Security Checks: Data Privacy Compliance - https://www.youtube.com/watch?v=qX2fyniKUIQ&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=10
  10. Business Logic Security Checks: Encryption Compliance - https://www.youtube.com/watch?v=V8zphJbltDY&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=11
  11. Business Logic Security: Enforcement Checks - https://www.youtube.com/watch?v=5e7qgY_L3UQ&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=12
  12. Business Logic Exploits: SQL Injection - https://www.youtube.com/watch?v=hcIysfhA9AA&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=13
  13. Business Logic Exploits: Security Misconfiguration - https://www.youtube.com/watch?v=ppLBtCQcYRk&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=15
  14. Business Logic Exploits: Data Leakage - https://www.youtube.com/watch?v=qe0bEvguvbs&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLIFI&index=16
  15. Demo 1 - https://www.youtube.com/watch?v=yV7O-QRyOao
  16. Demo 2 - https://www.youtube.com/watch?v=mzjTG7pKmQI
  17. Demo 3 - https://www.youtube.com/watch?v=A8V_58QZPMs
  18. Demo 4 - https://www.youtube.com/watch?v=1pvrEKAFJyk
  19. Demo 5 - https://hackerone.com/reports/145745
  20. Demo 6 - https://hackerone.com/reports/430854
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment