Section 1 : Chapter 1

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf

Section 2 : Preparation - Creating a Penetration Testing Lab

Lecture 2 Lab Overview & Needed Software 7:49
Lecture 3 Installing Kali 2020 As a Virtual Machine Using a Ready Image 11:13
Lecture 4 About Proctor Testing Pdf
Lecture 5 Installing Windows As a Virtual Machine 3:22
Lecture 6 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 7 Installing Metasploitable As a Virtual Machine 4:10

Section 3 : Preparation - Linux Basics

Lecture 8 Basic Overview Of Kali Linux 5:10
Lecture 9 The Linux Terminal & Basic Linux Commands 11:21
Lecture 10 Configuring Metasploitable & Lab Network Settings 5:38

Section 4 : Website Basics

Lecture 11 What is a Website 4:14
Lecture 12 How To Hack a Website 5:31

Section 5 : Information Gathering

Lecture 13 Gathering Information Using Whois Lookup 4:41
Lecture 14 Discovering Technologies Used On The Website 6:4
Lecture 15 Gathering Comprehensive DNS Information 10:23
Lecture 16 Discovering Websites On The Same Server 3:43
Lecture 17 Discovering Subdomains 5:6
Lecture 18 Discovering Sensitive Files
Lecture 19 Analysing Discovered Files 4:18
Lecture 20 Maltego - Discovering Servers, Domains & Files
Lecture 21 Maltego - Discovering Websites, Hosting Provider & Emails 4:49

Section 6 : File Upload Vulnerabilities

Lecture 22 How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites 6:44
Lecture 23 HTTP Requests - GET & POST 4:13
Lecture 24 Intercepting HTTP Requests 6:45
Lecture 25 Exploiting Advanced File Upload Vulnerabilities To Hack Websites 4:37
Lecture 26 Exploiting More Advanced File Upload Vulnerabilities 4:22
Lecture 27 [Security] Fixing File Upload Vulnerabilities 6:22

Section 7 : Code Execution Vulnerabilities

Lecture 28 How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack Websites 7:26
Lecture 29 Exploiting Advanced Code Execution Vulnerabilities 6:6
Lecture 30 [Security] - Fixing Code Execution Vulnerabilities 5:48

Section 8 : Local File Inclusion Vulnerabilities (LFI)

Lecture 31 What are they And How To Discover & Exploit Them 5:49
Lecture 32 Gaining Shell Access From LFI Vulnerabilities - Method 1 7:11
Lecture 33 Gaining Shell Access From LFI Vulnerabilities - Method 2 10:38

Section 9 : Remote File Inclusion Vulnerabilities (RFI)

Lecture 34 Remote File Inclusion Vulnerabilities - Configuring PHP Settings 3:46
Lecture 35 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 5:44
Lecture 36 Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites 2:49
Lecture 37 [Security] Fixing File Inclusion Vulnerabilities 5:55

Section 10 : SQL Injection Vulnerabilities

Lecture 38 What is SQL
Lecture 39 Dangers of SQL Injections 2:54

Section 11 : SQL Injection Vulnerabilities - SQLi In Login Pages

Lecture 40 Discovering SQL Injections In POST 7:56
Lecture 41 Bypassing Logins Using SQL Injection Vulnerability 4:49
Lecture 42 Bypassing More Secure Logins Using SQL Injections 6:25
Lecture 43 [Security] Preventing SQL Injections In Login Pages 7:44

Section 12 : SQL injection Vulnerabilities - Extracting Data From The Database

Lecture 44 Discovering SQL Injections in GET 7:2
Lecture 45 Reading Database Information 5:26
Lecture 46 Finding Database Tables 3:34
Lecture 47 Extracting Sensitive Data Such As Passwords 4:29

Section 13 : SQL injection Vulnerabilities - Advanced Exploitation

Lecture 48 Discovering & Exploiting Blind SQL Injections 5:54
Lecture 49 Discovering Complex SQL Injection Vulnerabilities 7:22
Lecture 50 Exploiting an advanced SQL Injection Vulnerability to Extract Passwords 4:48
Lecture 51 Bypassing Filters 4:49
Lecture 52 Bypassing Security & Accessing All Records 8:36
Lecture 53 [Security] Quick Fix To Prevent SQL Injections 6:44
Lecture 54 Reading & Writing Files On The Server Using SQL Injections 5:58
Lecture 55 Getting A Shell & Controlling The Target Server Using an SQL Injection 8:27
Lecture 56 Discovering SQL Injections & Extracting Data Using SQLmap 6:48
Lecture 57 Getting a Direct SQL Shell using SQLmap 2:58
Lecture 58 [Security] - The Right Way To Prevent SQL Injection Vulnerabilites 4:58

Section 14 : XSS Vulnerabilities

Lecture 59 Introduction - What is XSS or Cross Site Scripting 3:9
Lecture 60 Discovering Basic Reflected XSS 3:47
Lecture 61 Discovering Advanced Reflected XSS 4:35
Lecture 62 Discovering An Even More Advanced Reflected XSS 7:5
Lecture 63 Discovering Stored XSS 2:57
Lecture 64 Discovering Advanced Stored XSS 3:36
Lecture 65 About Proctor Testing Pdf

Section 15 : XSS Vulnerabilities - Exploitation

Lecture 66 Hooking Victims To BeEF Using Reflected XSS 5:42
Lecture 67 Hooking Victims To BeEF Using Stored XSS 4:9
Lecture 68 Interacting With Hooked Targets 3:56
Lecture 69 Running Basic Commands On Victims 4:24
Lecture 70 Stealing CredentialsPasswords Using A Fake Login Prompt 2:17
Lecture 71 Bonus - Installing Veil Framework
Lecture 72 Bonus - Veil Overview & Payloads Basics 7:20
Lecture 73 Bonus - Generating An Undetectable Backdoor Using Veil 3 9:44
Lecture 74 Bonus - Listening For Incoming Connections 7:19
Lecture 75 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 7:12
Lecture 76 Gaining Full Control Over Windows Target 3:40
Lecture 77 [Security] Fixing XSS Vulnerabilities

Section 16 : Insecure Session Management

Lecture 78 Logging In As Admin Without a Password By Manipulating Cookies 6:6
Lecture 79 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 6:46
Lecture 80 Exploiting CSRF To Change Admin Password Using a HTML File 7:0
Lecture 81 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link 5:41
Lecture 82 [Security] The Right Way To Prevent CSRF Vulnerabilities 9:20

Section 17 : Brute Force & Dictionary Attacks

Lecture 83 Introduction to Brute Force & Dictionary Attacks 3:45
Lecture 84 Creating a Wordlist 6:35
Lecture 85 Guessing Login Password Using a Wordlist Attack With Hydra 13:32

Section 18 : Discovering Vulnerabilities Automatically Using Owasp ZAP

Lecture 86 Scanning Target Website For Vulnerabilities 4:19
Lecture 87 Analysing Scan Results 4:11

Section 19 : Post Exploitation

Lecture 88 Post Exploitation Introduction 3:59
Lecture 89 Executing System Commands On Hacked Web Servers 6:59
Lecture 90 Escalating Reverse Shell Access To Weevely Shell 7:53
Lecture 91 Weevely Basics - Accessing Other Websites, Running Shell Commands 6:32
Lecture 92 Bypassing Limited Privileges & Executing Shell Commands 4:54
Lecture 93 Downloading Files From Target Webserver 4:40
Lecture 94 Uploading Files To Target Webserver 7:53
Lecture 95 Getting a Reverse Connection From Weevely 7:46
Lecture 96 Accessing The Database 8:53