Рет қаралды 77,269
Upload of the full Web Exploitation course.
All the material developed for the course is available in the OSCP repository, link down below.
----
TIMESTAMPS
######### Web 00 - Introduction
00:00:00 Web Exploitation Course
######### Web 01 - Introduction to Web Exploitation
00:03:17 Introduction
00:05:37 Clients and Servers
00:07:37 The HTTP Protocol
00:11:47 HTML
00:17:00 CSS
00:18:57 JavaScript and the DOM
00:23:00 Web Applications
00:29:07 Overview so far
00:30:47 HTTP is stateless
00:32:57 On Malicious HTTP requests
00:35:39 Introduction to BurpSuite
00:40:03 Using BurpSuite
00:48:02 A first vulnerability
00:52:42 Conclusion
######### Web 02 - Getting Used to BurpSuite
00:54:32 Introduction
00:55:52 Initial Setup
01:07:57 Installing PortSwigger CA certificate
01:12:12 Starting the web application
01:13:02 Configuring the scope
01:19:22 Proxy interception
01:23:27 Repeater
01:28:12 Decoder
01:30:32 Comparer
01:31:32 Analyzing cookie structure
01:36:32 Intruder
01:40:28 Sequencer
01:41:32 Dashboard
01:43:22 Extensions
01:45:32 Conclusion
######### Web 03 - SQL Injection
01:47:03 Introduction
01:50:18 Databases and Structured Query Language (SQL)
02:03:43 Simple queries
02:09:33 Interpreters
02:14:18 Injections
02:17:45 Example 1 - PHP Snippet
02:25:33 Example 2 - DVWA easy
02:37:13 Example 3 - DVWA medium
02:40:47 Example 4 - SecureBank
######### Web 04 - Directory Traversal
02:48:08 Introduction
02:49:53 Tomcat Setup
02:57:48 Static Web Application
03:02:08 Dynamic Web Application with JSP
03:03:48 Fuzzing with wfuzz to discover parameter
03:07:48 Analyzing the disclosed stacktrace
03:10:53 A simple Directory Traversal
03:16:03 A more complex Directory Traversal
03:20:58 Directory Traversal in SecureBank
03:26:58 Conclusion
######### Web 05 - File Inclusion
03:28:03 Introduction
03:29:55 Example 1 - LFI with JSP
03:46:13 Example 2 - LFI with php
03:57:53 Example 3 - RFI with php
04:03:03 Example 4 - DVWA challenges
04:12:53 Example 5 - Leak source code with php filters
######### Web 06 - File Upload Vulnerabilities
04:17:49 Introduction
04:19:29 Explanation of lab
04:24:11 POST request to upload a file
04:29:29 Reading php code
04:37:49 Solving level 1
04:43:41 Solving level 2
04:47:14 Solving level 3
04:56:31 PortSwigger Academy lab 1
05:00:56 PortSwigger Academy lab 2
05:02:33 PortSwigger Academy lab 3
05:08:27 Conclusion
######### Web 07 - Command Injections
05:09:31 Introduction
05:10:46 Some Intuition on Command Injections
05:16:36 DVWA level low
05:32:06 DVWA level medium
05:38:46 DVWA level high
05:40:34 DVWA level impossible
05:45:26 Port Swigger Lab 1
05:49:26 Port Swigger Lab 2
05:53:26 Port Swigger Lab 3
05:59:06 Conclusion
######### Web 08 - Cross Site Scripting
06:00:07 Introduction
06:03:07 Client-side attacks
06:06:42 Stored XSS - Intuition
06:18:07 Stored XSS - Leaking session cookie
06:25:47 Reflected XSS - Intuition
06:30:27 Reflected XSS - Leaking session cookie
06:33:37 DOM XSS
06:41:32 Review so far
06:43:12 Conclusion
######### Web 09 - Enumeration of Files and Directories
06:45:54 Introduction
06:48:54 Docker lab setup
06:50:34 Intuition on Web Enumeration
06:58:59 Using gobuster
######### Web 10 - Enumeration of Virtual Hosts
07:21:11 Introduction
07:24:44 Intuition on virtual hosts
07:46:41 Virtual Hosts and Domain Names
######### Web 11 - Enumeration of Parameters
07:51:16 Introduction
07:56:51 Wfuzz
08:21:46 IDOR
######### Web 12 - Brute Force Attacks
08:28:26 Introduction
08:30:50 Brute Forcing Scenarios
######### Web 11 - DNS Zone Transfer Attacks
09:01:26 Difference between VHOST and DNS
09:07:51 DNS zone transfer in practice
----
REFERENCES
- OSCP repository: github.com/LeonardoE95/OSCP
----
CONTACTS
- Blog: blog.leonardotamiano.xyz/
- Github: github.com/LeonardoE95?tab=repositories
- Support my Work: www.paypal.com/donate/?hosted_button_id=T49GUPRXALYTQ