Udemy - Learn Website Hacking / Penetration Testing From Scratch ...

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 1.8 GB
  • Uploaded By tutplanet
  • Downloads 691
  • Last checked 1 day ago
  • Date uploaded 6 years ago
  • Seeders 6
  • Leechers 4

Infohash : 865410E06020E4DA876052DA6AE70ADAE149F605



Udemy - Learn Website Hacking / Penetration Testing From Scratch [TP]

Welcome to my comprehensive course on Website & Web applicationsĀ Hacking!Ā This course assumesĀ you haveĀ NOĀ prior knowledgeĀ in hacking and by the end of it you'll be at a high level, being able toĀ hack websites like black-hat hackersĀ andĀ secure them like security experts!

For more Udemy Courses: https://tutorialsplanet.net

Files:

[Tutorialsplanet.NET] Udemy - Learn Website Hacking Penetration Testing From Scratch 1. Chapter 1
  • 1. Course Introduction.mp4 (26.0 MB)
  • 1. Course Introduction.vtt (3.1 KB)
10. SQL Injection Vulnerabilities
  • 1. What is SQL.mp4 (10.5 MB)
  • 1. What is SQL.vtt (6.7 KB)
  • 2. Dangers of SQL Injections.mp4 (6.7 MB)
  • 2. Dangers of SQL Injections.vtt (3.6 KB)
11. SQL Injection Vulnerabilities - SQLi In Login Pages
  • 1. Discovering SQL Injections In POST.mp4 (15.5 MB)
  • 1. Discovering SQL Injections In POST.vtt (9.3 KB)
  • 1.1 Fix table metasploit.accounts doesn't exist issue.html (0.1 KB)
  • 2. Bypassing Logins Using SQL Injection Vulnerability.mp4 (8.1 MB)
  • 2. Bypassing Logins Using SQL Injection Vulnerability.vtt (5.9 KB)
  • 3. Bypassing More Secure Logins Using SQL Injections.mp4 (11.4 MB)
  • 3. Bypassing More Secure Logins Using SQL Injections.vtt (7.5 KB)
  • 4. [Security] Preventing SQL Injections In Login Pages.mp4 (12.0 MB)
  • 4. [Security] Preventing SQL Injections In Login Pages.vtt (8.6 KB)
12. SQL injection Vulnerabilities - Extracting Data From The Database
  • 1. Discovering SQL Injections in GET.mp4 (15.4 MB)
  • 1. Discovering SQL Injections in GET.vtt (7.8 KB)
  • 2. Reading Database Information.mp4 (9.1 MB)
  • 2. Reading Database Information.vtt (5.3 KB)
  • 3. Finding Database Tables.mp4 (6.1 MB)
  • 3. Finding Database Tables.vtt (3.0 KB)
  • 4. Extracting Sensitive Data Such As Passwords.mp4 (7.6 MB)
  • 4. Extracting Sensitive Data Such As Passwords.vtt (4.6 KB)
13. SQL injection Vulnerabilities - Advanced Exploitation
  • 1. Discovering & Exploiting Blind SQL Injections.mp4 (7.9 MB)
  • 1. Discovering & Exploiting Blind SQL Injections.vtt (6.7 KB)
  • 1.1 sqli-tips.txt.txt (0.4 KB)
  • 1.2 sqli-quries.txt.txt (0.7 KB)
  • 10. Getting a Direct SQL Shell using SQLmap.mp4 (6.5 MB)
  • 10. Getting a Direct SQL Shell using SQLmap.vtt (2.7 KB)
  • 11. [Security] - The Right Way To Prevent SQL Injection.mp4 (8.4 MB)
  • 11. [Security] - The Right Way To Prevent SQL Injection.vtt (5.5 KB)
  • 2. Discovering a More Complicated SQL Injection.mp4 (13.0 MB)
  • 2. Discovering a More Complicated SQL Injection.vtt (8.3 KB)
  • 3. Extracting Data (passwords) By Exploiting a More Difficult SQL Injection.mp4 (7.7 MB)
  • 3. Extracting Data (passwords) By Exploiting a More Difficult SQL Injection.vtt (4.8 KB)
  • 4. Bypassing Filters.mp4 (6.5 MB)
  • 4. Bypassing Filters.vtt (5.3 KB)
  • 5. Bypassing Security & Accessing All Records.mp4 (69.3 MB)
  • 5. Bypassing Security & Accessing All Records.vtt (9.3 KB)
  • 6. [Security] Quick Fix To Prevent SQL Injections.mp4 (13.3 MB)
  • 6. [Security] Quick Fix To Prevent SQL Injections.vtt (8.0 KB)
  • 7. Reading & Writing Files On The Server Using SQL Injection Vulnerability.mp4 (12.6 MB)
  • 7. Reading & Writing Files On The Server Using SQL Injection Vulnerability.vtt (6.2 KB)
  • 9. Discovering SQL Injections & Extracting Data Using SQLmap.mp4 (21.5 MB)
  • 9. Discovering SQL Injections & Extracting Data Using SQLmap.vtt (7.4 KB)
14. XSS Vulnerabilities
  • 1. Introduction - What is XSS or Cross Site Scripting.mp4 (6.8 MB)
  • 1. Introduction - What is XSS or Cross Site Scripting.vtt (3.4 KB)
  • 2. Discovering Basic Reflected XSS.mp4 (6.4 MB)
  • 2. Discovering Basic Reflected XSS.vtt (3.6 KB)
  • 3. Discovering Advanced Reflected XSS.mp4 (7.7 MB)
  • 3. Discovering Advanced Reflected XSS.vtt (5.2 KB)
  • 3.1 XSS Filter Evasion Cheat Sheet.html (0.1 KB)
  • 4. Discovering An Even More Advanced Reflected XSS.mp4 (11.7 MB)
  • 4. Discovering An Even More Advanced Reflected XSS.vtt (8.3 KB)
  • 5. Discovering Stored XSS.mp4 (5.5 MB)
  • 5. Discovering Stored XSS.vtt (3.4 KB)
  • 6. Discovering Advanced Stored XSS.mp4 (5.8 MB)
  • 6. Discovering Advanced Stored XSS.vtt (4.1 KB)
15. XSS Vulnerabilities - Exploitation
  • 1. Hooking Victims To BeEF Using Reflected XSS.mp4 (10.5 MB)
  • 1. Hooking Victims To BeEF Using Reflected XSS.vtt (6.5 KB)
  • 10. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp4 (17.9 MB)
  • 10. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.vtt (7.9 KB)
  • 11. BeEF - Gaining Full Control Over Windows Target.mp4 (6.4 MB)
  • 11. BeEF - Gaining Full Control Over Windows Target.vtt (4.0 KB)
  • 12. [Security] Fixing XSS Vulnerabilities.mp4 (17.2 MB)
  • 12. [Security] Fixing XSS Vulnerabilities.vtt (8.4 KB)
  • 2. Hooking Victims To BeEF Using Stored XSS.mp4 (7.0 MB)
  • 2. Hooking Victims To BeEF Using Stored XSS.vtt (4.8 KB)
  • 3. BeEF - Interacting With Hooked Victims.mp4 (6.5 MB)
  • 3. BeEF - Interacting With Hooked Victims.vtt (6.5 MB)
  • 4. BeEF - Running Basic Commands On Victims.mp4 (8.0 MB)
  • 4. BeEF - Running Basic Commands On Victims.vtt (5.1 KB)
  • 5. BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt.mp4 (4.3 MB)
  • 5. BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt.vtt (2.6 KB)
  • 6. Bonus - Installing Veil 3.1.mp4 (41.6 MB)
  • 6. Bonus - Installing Veil 3.1.vtt (6.9 KB)
  • 6.1 Veil Git Repo.html (0.1 KB)
  • 7. Bonus - Veil Overview & Payloads Basics.mp4 (13.6 MB)
  • 7. Bonus - Veil Overview & Payloads Basics.vtt (8.8 KB)
  • 8. Bonus - Generating An Undetectable Backdoor Using Veil 3.mp4 (21.0 MB)
  • 8. Bonus - Generating An Undetectable Backdoor Using Veil 3.vtt (10.9 KB)
  • 8.1 Another way of generating an undetectable backdoor.html (0.1 KB)
  • 8.2 Nodistribute - Online Virus Scanner.html (0.1 KB)
  • 8.3 Alternative to Nodistribute.html (0.1 KB)
  • 9. Bonus - Listening For Incoming Connections.mp4 (12.6 MB)
  • 9. Bonus - Listening For Incoming Connections.vtt (7.9 KB)
16. Insecure Session Management
  • 1. Logging In As Admin Without a Password By Manipulating Cookies.mp4 (12.6 MB)
  • 1. Logging In As Admin Without a Password By Manipulating Cookies.vtt (6.5 KB)
  • 2. Discovering Cross Site Request Forgery Vulnerabilities (CSRF).mp4 (19.1 MB)
  • 2. Discovering Cross Site Request Forgery Vulnerabilities (CSRF).vtt (8.2 KB)
  • 3. Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File.mp4 (17.7 MB)
  • 3. Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File.vtt (8.2 KB)
  • 4. Exploiting CSRF Vulnerabilities To Change Admin Password Using Link.mp4 (14.6 MB)
  • 4. Exploiting CSRF Vulnerabilities To Change Admin Password Using Link.vtt (6.7 KB)
  • 5. [Security] The Right Way To Prevent CSRF Vulnerabilities.mp4 (24.3 MB)
  • 5. [Security] The Right Way To Prevent CSRF Vulnerabilities.vtt (10.8 KB)
17. Brute Force & Dictionary Attacks
  • 1. What Are Brute Force & Dictionary Attacks.mp4 (7.4 MB)
  • 1. What Are Brute Force & Dictionary Attacks.vtt (4.8 KB)
  • 2. Creating a Wordlist.mp4 (12.2 MB)
  • 2. Creating a Wordlist.vtt (7.7 KB)
  • 2.1 Some-Links-To-Wordlists-1.txt.txt (0.4 KB)
  • 3. Launching a Wordlist Attack & Guessing Login Password Using Hydra.mp4 (33.9 MB)
  • 3. Launching a Wordlist Attack & Guessing Login Password Using Hydra.vtt (14.4 KB)
18. Discovering Vulnerabilities Automatically Using Owasp ZAP
  • 1. Scanning Target Website For Vulnerabilities.mp4 (8.4 MB)
  • 1. Scanning Target Website For Vulnerabilities.vtt (4.7 KB)
  • 2. Analysing Scan Results.mp4 (9.4 MB)
  • 2. Analysing Scan Results.vtt (4.3 KB)
19. Post Exploitation
  • 1. Post Exploitation Introduction.mp4 (8.1 MB)
  • 1. Post Exploitation Introduction.vtt (4.5 KB)
  • 1.1 Post-Exploitation.pdf.pdf (167.9 KB)
  • 2. Interacting With The Reverse Shell Access Obtained In Previous Lectures.mp4 (13.4 MB)
  • 2. Interacting With The Reverse Shell Access Obtained In Previous Lectures.vtt (8.1 KB)
  • 3. Escalating Reverse Shell Access To Weevely Shell.mp4 (11.4 MB)
  • 3. Escalating Reverse Shell Access To Weevely Shell.vtt (8.1 KB)
  • 4. Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc.mp4 (13.9 MB)
  • 4. Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc.vtt (7.4 KB)
  • 5. Bypassing Limited Privileges & Executing Shell Commands.mp4 (10.4 MB)
  • 5. Bypassing Limited Privileges & Executing Shell Commands.vtt (6.0 KB)
  • 6. Downloading Files From Target Webserver.mp4 (10.7 MB)
  • 6. Downloading Files From Target Webserver.vtt (5.3 KB)
  • 7. Uploading Files To Target Webserver.mp4 (18.2 MB)
  • 7. Uploading Files To Target Webserver.vtt (8.6 KB)
  • 8. Getting a Reverse Connection From Weevely.mp4 (15.7 MB)
  • 8. Getting a Reverse Connection From Weevely.vtt (8.7 KB)
  • 9. Accessing The Database.mp4 (21.2 MB)
  • 9. Accessing The Database.vtt (9.5 KB)
2. Preparation - Creating a Penetration Testing Lab
  • 1. Lab Overview & Needed Software.mp4 (106.5 MB)
  • 1. Lab Overview & Needed Software.vtt (8.5 KB)
  • 1.1 Virtual Box Download Page.html (0.1 KB)
  • 1.2 The Lab.pdf.pdf (347.0 KB)
  • 2. Installing Kali 2019 As a Virtual Machine Using a Ready Image.mp4 (156.1 MB)
  • 2. Installing Kali 2019 As a Virtual Machine Using a Ready Image.vtt (11.5 KB)
  • 2.1 Kali Linux Ready Images Download Page.html (0.1 KB)
  • 2.2 How To Fix No Nat Network Issue.html (0.1 KB)
  • 2.3 How To Fix Blank Screen When Starting Kali.html (0.2 KB)
  • 2.4 Installing Kali Using ISO (use this method to install it as a Main machine)..html (0.1 KB)
  • 3. Installing Metasploitable As a Virtual Machine.mp4 (11.1 MB)
  • 3. Installing Metasploitable As a Virtual Machine.vtt (4.7 KB)
  • 3.1 Metasploitable Download Page.html (0.1 KB)
  • 4. Installing Windows As a Virtual Machine.mp4 (9.4 MB)
  • 4. Installing Windows As a Virtual Machine.vtt (3.9 KB)
  • 4.1 Windows Image Download Page.html (0.1 KB)
20. Bonus Section
  • 1. Bonus Lecture - What's Next.html (5.2 KB)
3. Preparation - Linux Basics
  • 1. Basic Overview Of Kali Linux.mp4 (107.4 MB)
  • 1. Basic Overview Of Kali Linux.vtt (5.8 KB)
  • 2. The Linux Terminal & Basic Linux Commands.mp4 (223.5 MB)
  • 2. The Linux Terminal & Basic Linux Commands.vtt (12.3 KB)
  • 2.1 List Of Linux Commands.html (0.1 KB)
  • 3. Configuring Metasploitable & Lab Network Settings.mp4 (15.3 MB)
  • 3. Configuring Metasploitable & Lab Network Settings.vtt (6.6 KB)
  • 3.1 How To Fix No Nat Network Issue.html (0.1 KB)
4. Website Basics
  • 1. What is a Website.mp4 (11.7 MB)
  • 1. What is a Website.vtt (4.8 KB)
  • 1.1 Intro-what-is-a-website.pdf.pdf (360.1 KB)
  • 2. How To Hack a Website .mp4 (16.8 MB)
  • 2. How To Hack a Website .vtt (7.0 KB)
5. Information Gathering
  • 1. Gathering Information Using Whois Lookup.mp4 (11.3 MB)
  • 1. Gathering Information Using Whois Lookup.vtt (5.2 KB)
  • 1.1 Domaintools Whois Lookup Palge.html (0.1 KB)
  • 1.2 Information Gathering.pdf.pdf (111.7 KB)
  • 2. Discovering Technologies Used On The Website.mp4 (16.8 MB)
  • 2. Discovering Technologies Used On The Website.vtt (6.5 KB)
  • 2.1 Netcraft.html (0.1 KB)
  • 3. Gathering Comprehensive DNS Information.mp4 (106.5 MB)
  • 3. Gathering Comprehensive DNS Information.vtt (11.1 KB)
  • 3.1 robtex.com.html (0.1 KB)
  • 4. Discovering Websites On The Same Server.mp4 (9.3 MB)
  • 4. Discovering Websites On The Same Server.vtt (4.1 KB)
  • 5. Discovering Subdomains.mp4 (10.0 MB)
  • 5. Discovering Subdomains.vtt (5.8 KB)
  • 5.1 Knock Git Repo.html (0.1 KB)
  • 6. Discovering Sensitive Files.mp4 (15.4 MB)
  • 6. Discovering Sensitive Files.vtt (8.0 KB)
  • 7. Analysing Discovered Files.mp4 (8.6 MB)
  • 7. Analysing Discovered Files.vtt (4.8 KB)
  • 8. Maltego - Discovering Servers, Domains & Files.mp4 (16.8 MB)
  • 8. Maltego - Discovering Servers, Domains & Files.vtt (9.0 KB)
  • 9. Maltego - Discovering Websites, Hosting Provider & Emails.mp4 (10.1 MB)
  • 9. Maltego - Discovering Websites, Hosting Provider & Emails.vtt (5.4 KB)
6. File Upload Vulnerabilities
  • 1. What are they And How To Discover & Exploit Basic File Upload Vulnerabilities.mp4 (12.1 MB)
  • 1. What are they And How To Discover & Exploit Basic File Upload Vulnerabilities.vtt (7.8 KB)
  • 1.1 File upload, Code execution, LFI, RFI, SQLi, XSS.pdf.pdf (541.8 KB)
  • 2. HTTP Requests - GET & POST.mp4 (10.1 MB)
  • 2. HTTP Requests - GET & POST.vtt (4.8 KB)
  • 3. Intercepting HTTP Requests.mp4 (16.0 MB)
  • 3. Intercepting HTTP Requests.vtt (8.2 KB)
  • 3.1 Configuring Burp to Handle HTTPS.html (0.1 KB)
  • 4. Exploiting Advanced File Upload Vulnerabilities.mp4 (11.0 MB)
  • 4. Exploiting Advanced File Upload Vulnerabilities.vtt (5.1 KB)
  • 5. Exploiting More Advanced File Upload Vulnerabilities.mp4 (9.1 MB)
  • 5. Exploiting More Advanced File Upload Vulnerabilities.vtt (4.7 KB)
  • 6. [Security] Fixing File Upload Vulnerabilities.mp4 (13.3 MB)
  • 6. [Security] Fixing File Upload Vulnerabilities.vtt (7.2 KB)
  • 6.1 Link To Secure File Upload Code.html (0.2 KB)
7. Code Execution Vulnerabilities
  • 1. What are they & How To Discover & Exploit Basic Code Execution Vulnerabilities.mp4 (12.4 MB)
  • 1. What are they & How To Discover & Exploit Basic Code Execution Vulnerabilities.vtt (8.1 KB)
  • 1.1 code-execution-reverse-shell-commands.txt.txt (0.9 KB)
  • 2. Exploiting Advanced Code Execution Vulnerabilities.mp4 (13.1 MB)
  • 2. Exploiting Advanced Code Execution Vulnerabilities.vtt (6.7 KB)
  • 3. [Security] - Fixing Code Execution Vulnerabilities.mp4 (10.4 MB)
  • 3. [Security] - Fixing Code Execution Vulnerabilities.vtt (6.5 KB)
8. Local File Inclusion Vulnerabilities (LFI)
  • 1. What are they And How To Discover & Exploit Them.mp4 (9.2 MB)
  • 1. What are they And How To Discover & Exploit Them.vtt (5.8 KB)
  • 2. Gaining Shell Access From LFI Vulnerabilities - Method 1.mp4 (15.5 MB)
  • 2. Gaining Shell Access From LFI Vulnerabilities - Method 1.vtt (8.0 KB)
  • 3. Gaining Shell Access From LFI Vulnerabilities - Method 2.mp4 (22.4 MB)
  • 3. Gaining Shell Access From LFI Vulnerabilities - Method 2.vtt (12.0 KB)
9. Remote File Inclusion Vulnerabilities (RFI)
  • 1. Remote File Inclusion Vulnerabilities - Configuring PHP Settings.mp4 (7.3 MB)
  • 1. Remote File Inclusion Vulnerabilities - Configuring PHP Settings.vtt (3.8 KB)
  • 2. Remote File Inclusion Vulnerabilities - Discovery & Exploitation.mp4 (8.5 MB)
  • 2. Remote File Inclusion Vulnerabilities - Discovery & Exploitation.vtt (6.5 KB)
  • 3. Exploiting Advanced Remote File Inclusion Vulnerabilities.mp4 (5.8 MB)
  • 3. Exploiting Advanced Remote File Inclusion Vulnerabilities.vtt (3.0 KB)
  • 4. [Security] Fixing File Inclusion Vulnerabilities.mp4 (10.4 MB)
  • 4. [Security] Fixing File Inclusion Vulnerabilities.vtt (6.4 KB)
  • [Tutorialsplanet.NET].url (0.1 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • ahttp://0d.kebhana.mx:443/announce
  • udp://bigfoot1942.sektori.org:6969/announce
  • https://tracker.fastdownload.xyz:443/announce
  • https://opentracker.xyz:443/announce
  • http://open.trackerlist.xyz:80/announce
  • http://torrent.nwps.ws:80/announce
  • udp://tracker.port443.xyz:6969/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://t.nyaatracker.com:80/announce
  • udp://tracker.birkenwald.de:6969/announce
  • udp://tracker.vanitycore.co:6969/announce
  • udp://tracker.torrent.eu.org:451/announce
  • udp://retracker.lanta-net.ru:2710/announce
  • udp://retracker.hotplug.ru:2710/announce
  • udp://bt.xxx-tracker.com:2710/announce
  • udp://tracker.uw0.xyz:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://explodie.org:6969/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://tracker.iamhansen.xyz:2000/announce
  • udp://tracker.toss.li:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://tracker.justseed.it:1337/announce
  • https://2.track.ga:443/announce
  • udp://open.stealth.si:80/announce
  • udp://zephir.monocul.us:6969/announce
  • udp://open.demonii.si:1337/announce
REVERSE-PROXY šŸ”„ RP (success) | 1736ms | Saved: 12TjdteV... šŸ“„ torrent šŸ• 16 Jan 2026, 03:53:30 pm IST ā° 10 Feb 2026, 03:53:30 pm IST āœ… Valid for 24d 23h šŸ”„ Wait 10m