Udemy - Learn Website Hacking / Penetration Testing From Scratch

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 1.9 GB
  • Uploaded By CourseClub
  • Downloads 1755
  • Last checked 4 days ago
  • Date uploaded 7 years ago
  • Seeders 8
  • Leechers 6

Infohash : 0B20727B747B856EBAE1A5F94F3BF3364AA5C6AC



Learn Website Hacking / Penetration Testing From Scratch

Learn how to hack websites and web applications like black hat hackers, and learn how to secure them from these hackers.

For More Courses Visit: https://desirecourse.com

Files:

[DesireCourse.Com] Udemy - Learn Website Hacking Penetration Testing From Scratch 00 None
  • 001 Course Introduction.mp4 (26.0 MB)
01 Preparation - Creating a Penetration Testing Lab
  • 002 Lab Overview Needed Software.mp4 (12.6 MB)
  • 003 Installing Kali 2017 As a Virtual Machine Using a Ready Image.mp4 (22.7 MB)
  • 004 Installing Metasploitable As a Virtual Machine.mp4 (16.6 MB)
  • 005 Installing Windows As a Virtual Machine.mp4 (12.3 MB)
  • attached_files 002 Lab Overview Needed Software
    • The-Lab.pdf (347.0 KB)
    02 Preparation - Linux Basics
    • 006 Basic Overview Of Kali Linux.mp4 (80.7 MB)
    • 007 The Linux Terminal Basic Linux Commands.mp4 (97.9 MB)
    • 008 Configuring Metasploitable Lab Network Settings.mp4 (22.1 MB)
    03 Website Basics
    • 009 What is a Website.mp4 (72.3 MB)
    • 010 How To Hack a Website.mp4 (53.0 MB)
    • attached_files 009 What is a Website
      • Intro-what-is-a-website.pdf (360.1 KB)
      04 Information Gathering
      • 011 Gathering Information Using Whois Lookup.mp4 (17.2 MB)
      • 012 Discovering Technologies Used On The Website.mp4 (22.4 MB)
      • 013 Gathering Comprehensive DNS Information.mp4 (23.3 MB)
      • 014 Discovering Websites On The Same Server.mp4 (14.6 MB)
      • 015 Discovering Subdomains.mp4 (15.9 MB)
      • 016 Discovering Sensitive Files.mp4 (24.9 MB)
      • 017 Analysing Discovered Files.mp4 (11.4 MB)
      • 018 Maltego - Discovering Servers Domains Files.mp4 (28.2 MB)
      • 019 Maltego - Discovering Websites Hosting Provider Emails.mp4 (14.8 MB)
      • attached_files 011 Gathering Information Using Whois Lookup
        • Information-Gathering.pdf (111.7 KB)
        05 File Upload Vulnerabilities
        • 020 What are they And How To Discover Exploit Basic File Upload Vulnerabilites.mp4 (16.9 MB)
        • 021 HTTP Requests - GET POST.mp4 (38.6 MB)
        • 022 Intercepting HTTP Requests.mp4 (24.8 MB)
        • 023 Exploiting Advanced File Upload Vulnerabilities.mp4 (16.2 MB)
        • 024 Exploiting More Advanced File Upload Vulnerabilities.mp4 (13.3 MB)
        • 025 Security Fixing File Upload Vulnerabilities.mp4 (19.7 MB)
        • attached_files 020 How To Discover Exploit Basic File Upload Vulnerabilites
          • File-upload-Code-execution-LFI-RFI-SQLi-XSS.pdf (541.8 KB)
          06 Code Execution Vulnerabilities
          • 026 What are they How To Discover Exploit Basic Code Execution Vulnerabilities.mp4 (19.3 MB)
          • 027 Exploiting Advanced Code Execution Vulnerabilities.mp4 (19.0 MB)
          • 028 Security - Fixing Code Execution Vulnerabilities.mp4 (15.1 MB)
          07 Local File Inclusion Vulnerabilities LFI
          • 029 What are they And How To Discover Exploit Them.mp4 (13.7 MB)
          • 030 Gaining Shell Access From LFI Vulnerabilities - Method 1.mp4 (20.9 MB)
          • 031 Gaining Shell Access From LFI Vulnerabilities - Method 2.mp4 (30.2 MB)
          08 Remote File Inclusion Vulnerabilities RFI
          • 032 Remote File Inclusion Vulnerabilities - Configuring PHP Settings.mp4 (11.8 MB)
          • 033 Remote File Inclusion Vulnerabilities - Discovery Exploitation.mp4 (12.7 MB)
          • 034 Exploiting Advanced Remote File Inclusion Vulnerabilities.mp4 (5.8 MB)
          • 035 Security Fixing File Inclusion Vulnerabilities.mp4 (15.0 MB)
          09 SQL Injection Vulnerabilities
          • 036 What is SQL.mp4 (15.6 MB)
          • 037 Dangers of SQL Injections.mp4 (10.2 MB)
          10 SQL Injection Vulnerabilities - SQLi In Login Pages
          • 038 Discovering SQL Injections In POST.mp4 (23.1 MB)
          • 039 Bypassing Logins Using SQL Injection Vulnerability.mp4 (11.4 MB)
          • 040 Bypassing More Secure Logins Using SQL Injections.mp4 (15.6 MB)
          • 041 Security Preventing SQL Injections In Login Pages.mp4 (17.4 MB)
          11 SQL injection Vulnerabilities - Extracting Data From The Database
          • 042 Discovering SQL Injections in GET.mp4 (17.2 MB)
          • 043 Reading Database Information.mp4 (12.4 MB)
          • 044 Finding Database Tables.mp4 (10.1 MB)
          • 045 Extracting Sensitive Data Such As Passwords.mp4 (10.3 MB)
          12 SQL injection Vulnerabilities - Advanced Exploitation
          • 046 Discovering Exploiting Blind SQL Injections.mp4 (9.6 MB)
          • 047 Discovering a More Complicated SQL Injection.mp4 (18.2 MB)
          • 048 Extracting Data passwords By Exploiting a More Difficult SQL Injection.mp4 (10.8 MB)
          • 049 Bypassing Security Accessing All Records.mp4 (15.6 MB)
          • 050 Bypassing Filters.mp4 (8.9 MB)
          • 051 Security Quick Fix To Prevent SQL Injections.mp4 (17.9 MB)
          • 052 Reading Writing Files On The Server Using SQL Injection Vulnerability.mp4 (17.7 MB)
          • 053 Getting A Reverse Shell Access Gaining Full Control Over The Target Web Server.mp4 (17.7 MB)
          • 054 Discovering SQL Injections Extracting Data Using SQLmap.mp4 (31.1 MB)
          • 055 Getting a Direct SQL Shell using SQLmap.mp4 (10.2 MB)
          • 056 Security - The Right Way To Prevent SQL Injection.mp4 (12.3 MB)
          • attached_files 046 Discovering Exploiting Blind SQL Injections
            • sqli-quries.txt (0.7 KB)
            • sqli-tips.txt (0.4 KB)
            13 XSS Vulnerabilities
            • 057 Introduction - What is XSS or Cross Site Scripting.mp4 (10.2 MB)
            • 058 Discovering Basic Reflected XSS.mp4 (9.7 MB)
            • 059 Discovering Advanced Reflected XSS.mp4 (10.1 MB)
            • 060 Discovering An Even More Advanced Reflected XSS.mp4 (16.4 MB)
            • 061 Discovering Stored XSS.mp4 (8.2 MB)
            • 062 Discovering Advanced Stored XSS.mp4 (7.4 MB)
            • 063 Discovering Dom Based XSS.mp4 (15.4 MB)
            14 XSS Vulnerabilities - Exploitation
            • 064 Hooking Victims To BeEF Using Reflected XSS.mp4 (15.0 MB)
            • 065 Hooking Victims To BeEF Using Stored XSS.mp4 (10.1 MB)
            • 066 BeEF - Interacting With Hooked Victims.mp4 (8.3 MB)
            • 067 BeEF - Running Basic Commands On Victims.mp4 (14.0 MB)
            • 068 BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt.mp4 (7.3 MB)
            • 069 Installing Veil 3.mp4 (21.3 MB)
            • 070 Bonus - Veil Overview Payloads Basics.mp4 (13.6 MB)
            • 071 Bonus - Generating An Undetectable Backdoor Using Veil 3.mp4 (21.0 MB)
            • 072 Bonus - Listening For Incoming Connections.mp4 (12.6 MB)
            • 073 Bonus - Using A Basic Deliver Method To Test The Backdoor Hack Windows 10.mp4 (17.9 MB)
            • 074 BeEF - Gaining Full Control Over Windows Target.mp4 (10.9 MB)
            • 075 Security Fixing XSS Vulnerabilities.mp4 (22.1 MB)
            15 Insecure Session Management
            • 076 Logging In As Admin Without a Password By Manipulating Cookies.mp4 (15.5 MB)
            • 077 Discovering Cross Site Request Forgery Vulnerabilities CSRF.mp4 (67.1 MB)
            • 078 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File.mp4 (65.1 MB)
            • 079 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link.mp4 (19.9 MB)
            • 080 Security The Right Way To Prevent CSRF Vulnerabilities.mp4 (35.3 MB)
            16 Brute Force Dictionary Attacks
            • 081 What Are Brute Force Dictionary Attacks.mp4 (10.6 MB)
            • 082 Creating a Wordlist.mp4 (20.0 MB)
            • 083 Launching a Wordlist Attack Guessing Login Password Using Hydra.mp4 (44.5 MB)
            • attached_files 082 Creating a Wordlist
              • Some-Links-To-Wordlists-1.txt (0.4 KB)
              17 Discovering Vulnerabilities Automatically Using Owasp ZAP
              • 084 Scanning Target Website For Vulnerabilities.mp4 (12.4 MB)
              • 085 Analysing Scan Results.mp4 (15.6 MB)
              18 Post Exploitation
              • 086 Post Exploitation Introduction.mp4 (10.3 MB)
              • 087 Interacting With The Reverse Shell Access Obtained In Previous Lectures.mp4 (15.0 MB)
              • 088 Escalating Reverse Shell Access To Weevely Shell.mp4 (14.8 MB)
              • 089 Weevely Basics - Accessing Other Websites Running Shell Commands ...etc.mp4 (17.1 MB)
              • 090 Bypassing Limited Privileges Executing Shell Commands.mp4 (12.7 MB)
              • 091 Downloading Files From Target Webserver.mp4 (14.0 MB)
              • 092 Uploading Files To Target Webserver.mp4 (23.7 MB)
              • 093 Getting a Reverse Connection From Weevely.mp4 (19.9 MB)
              • 094 Accessing The Database.mp4 (28.1 MB)
              • attached_files 086 Post Exploitation Introduction
                • Post-Exploitation.pdf (167.9 KB)
                19 Bonus Section
                • 095 Bonus Lecture - Discounts On My Ethical Hacking Courses.html (3.8 KB)
                • [DesireCourse.Com].url (0.0 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://62.138.0.158:6969/announce
  • udp://87.233.192.220:6969/announce
  • udp://88.198.231.1:1337/announce
  • udp://151.80.120.113:2710/announce
  • udp://111.6.78.96:6969/announce
  • udp://90.179.64.91:1337/announce
  • udp://51.15.4.13:1337/announce
  • udp://191.96.249.23:6969/announce
  • udp://35.187.36.248:1337/announce
  • udp://123.249.16.65:2710/announce
  • udp://127.0.0.1:6969/announce
  • udp://210.244.71.25:6969/announce
  • udp://78.142.19.42:1337/announce
  • udp://173.254.219.72:6969/announce
  • udp://51.15.76.199:6969/announce
  • udp://91.212.150.191:3418/announce
  • udp://103.224.212.222:6969/announce
  • udp://92.241.171.245:6969/announce
  • udp://51.15.40.114:80/announce
  • udp://37.19.5.139:6969/announce
EDGE-CACHE ⚡ EC (hit) 📄 torrent 🕐 15 Jan 2026, 01:15:22 am IST ⏰ 09 Feb 2026, 01:15:19 am IST ✅ Valid for 22d 12h 🔄 Refresh Cache