Instructional Video2:12
Curated Video

APK File Structure

Higher Ed
This video will explain the APK file structure
Instructional Video3:35
Curated Video

Various Password Attacks

Higher Ed
This video will show you the various techniques used in hacking passowrds
Instructional Video6:16
Curated Video

Execute an Offline Password Attack in Linux

Higher Ed
Learn how to plan an execute an offline password attack on Linux using the HashCat powerful tool
Instructional Video4:47
Curated Video

Collect and Visualize Data with Maltego

Higher Ed
This video will explain the poweful OSINT application called Maltego, and how you can leverage it in collecting open source data on your victim.
Instructional Video6:10
Curated Video

Bypass Firewalls by Tunneling Data and Commands over DNS new

Higher Ed
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Instructional Video1:57
Curated Video

Sensitive Data Exposure

Higher Ed
Sensntive data exposure is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video7:11
Curated Video

How to Attack Modern Wireless Networks - Introduction

Higher Ed
This video is a general overview on how to attack wireless networks
Instructional Video1:51
Curated Video

Setup Your Lab in Kali

Higher Ed
In this video, you will learn how to install the necessary tools to setup your safe lab for malware analysis
Instructional Video3:09
Curated Video

Create a Malicious Application

Higher Ed
This video will teach you how to create an Android malicious application using Kali Linux
Instructional Video0:50
Curated Video

Tips to Improve Your Wireless Network Security

Higher Ed
This video will teach you some tips on how to protect your network
Instructional Video1:52
Curated Video

Password Management Tips

Higher Ed
This video will share important tips to setup passwords
Instructional Video2:33
Curated Video

Metasploitable VM

Higher Ed
Metasploitable MV is an intentionaly vulnerable machine by Rapid7, it is made for learning purposes. We will learn how to setup this virtual machine to exploit it in many of the videos in this course
Instructional Video6:15
Curated Video

How Can Pentest.ws Help You

Higher Ed
Learn how to document your findings for a professional presentation
Instructional Video1:49
Curated Video

Insufficient Logging and Monitoring

Higher Ed
Insufficient logging and monitoring is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video1:43
Curated Video

Installing Windows

Higher Ed
This video will teach you how to install and setup Windows (The victim's machine)
Instructional Video7:56
Curated Video

Discover Vulnerabilities in Websites

Higher Ed
In this video, you will learn about various tools used to discover vulberabilities in web applications.
Instructional Video1:31
Curated Video

Why Android

Higher Ed
This video will shed the light on the market share of Android and its dominance
Instructional Video1:53
Curated Video

Extract APKs From Your Phone

Higher Ed
You will learn how to export any Android application that exists on your phone and reverse engineer it in your lab
Instructional Video7:39
Curated Video

Intercept_ Analyze_ and Replay Web Traffic

Higher Ed
Learn how to leverage the powerful Burp suite in analyzing web traffic and crafting attacks
Instructional Video0:36
Curated Video

Different Installation Methods

Higher Ed
This video will show you various approaches to setup Kali Linux
Instructional Video1:57
Curated Video

Run an Online Password Attack on a Router

Higher Ed
Learn how to plan an execute an online password attack on a router
Instructional Video1:41
Curated Video

Why KALI

Higher Ed
Kali is a powerful pentest box, in this video we will explain the reasons behind its fame
Instructional Video5:11
Curated Video

Explore Main Services and Install Necessary Programs

Higher Ed
This video will help you get started in setting up your lab
Instructional Video8:35
Curated Video

Execute Man-in-the-Middle Attacks

Higher Ed
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali