Curated Video
Chatbots Development with Amazon Lex - Response Cards
This is the last step in creating an Amazon Lex chatbot, creating and adding response cards, including the card setup, slot upgradation, chatbot building, and demonstration.
Curated Video
Fundamentals of Secure Software - Source Code Review
This video explains how to perform a secure code review.
Curated Video
Fundamentals of Secure Software - SKF Demo
This is a demo video of the SKF (Security Knowledge Framework).
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 2
This video explains exploiting race conditions for case 2. Here, you would be looking at how the hackers reuse a one-time discount code. This clip is from the chapter "Exploiting Race Conditions with OWASP ZAP" of the series "Web...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part1)
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Fuzzing for Path Traversal Demo
This is a demo video on Fuzzing for path traversal. This clip is from the chapter "Fuzzing with Burp Suite Intruder" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on Fuzzing with Burp Suite...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Insecure HTTP Web Pages
This video talks about how to find insecure HTTP web pages using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Sensitive Data in URLs
This video talks about how to find sensitive data in URLs using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Internal Server Errors
This video talks about how to find internal server errors using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Publicly Exposed Backup Files
This video talks about how to find publicly exposed backup files using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding SQL Syntax Errors
This video talks about how to find SQL syntax errors using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Directory Listings
This video talks about how to find directory listings using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - From SQL Injection to Remote Code Execution Demo
This is a demo video that demonstrates how to execute the code from SQL injection to remote. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - From SQL Injection to Remote Code Execution Overview
This video provides an overview of how to execute the code from SQL injection to remote. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Sqlmap Demo
This is a demo video of the basics of Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Sqlmap Overview
This video provides an overview of the basics of Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 1
This is the first of the two-part video that demonstrates the actual attack where you would take control of the account with the help of Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - HTTP Parameter Pollution – Part 1
This is the first of the two-part video that talks about the root cause of the problem in the browser where we can use this HTTP Parameter Pollution. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Full-Stack Attacks on Modern Web Applications
This video introduces the section. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".null
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 2
This video explains exploiting race conditions for case 2. Here, you would be looking at how the hackers re-use one-time discount code. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Summary – Hacking AngularJS Applications
This is a summary video on hacking AngularJS applications. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking AngularJS Applications
This video introduces the section. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS applications.
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 1
This is the first of the two-part video that talks about how to attack through link. You will work on the user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 2
This is the second of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...