Learn Website Hacking and Hunting Bug Bounties
Free

-
SECTION 1: INTRODUCTION
-
SECTION 2: LAB SET UP
-
SECTION 3: INFORMATION GATHERING
-
SECTION 4: EXPLOITING FILE UPLOAD VULNERABILITIES
- What is a File Upload Vulnerability?
- Exploiting File Upload Vulnerability with Weevely (DVWA – low security)
- Exploiting File Upload Vulnerability with Metasploit (DVWA – low security)
- HTTP Get vs HTTP Post Method
- HTTP Get and HTTP Post Real Examples
- Proxy Server
- Installing Burpsuite Community on a Linux Machine
- Intercepting HTTP Get and Post Requests with Burpsuite
- Exploiting File Upload Vulnerability with Metasploit (DVWA – medium security)
- Exploiting File Upload Vulnerability with Metasploit (DVWA – high security)
- Security Counter-measures
-
SECTION 5: EXPLOITING COMMAND EXECUTION VULNERABILITIES
-
Holuwasheyi16
Awesome
Thanks so much.clear explanation
-
aamalik4me
Awesome
Sir am very impressed with how you present a lecture with clear explanation. Thanks for your contribution
1 Comment
@aamalik4me I am so glad you found the course useful. If you have questions post it under the Forums section: https://forums.phoenyxacademy.com/