- How to set burp to intercept HTTP messages
- How to scan web using Burp via Tor Proxy
- How to install Burp certificates to Firefox Browser
Information gathering
Review Vulnerabilities
“WordPress
- How to enum username and attack password (WordPress)
- How to create the wordlist from the word of target website
Jenkins
TIKIWIKI
- How to set Tikiwiki – Metasploitable2
- How to exploit TikiWiki (<= 1.9.8) ‘tiki-graph_formula.php’ Command Execution – Metasploitable2
DVWA
- How to install DVWA in Kali
- How to test the command execution
- How to exploit the vulnerability of command execution using netcat
- How to exploit the vulnerability of SQL injection (Manual)
- How to exploit the vulnerability of SQL injection (Manual) – 2: password attacks
- How to upload the PHP Backdoor payload
- How to POC the Cross Site Request Forgery (CSRF)
- How to guess the passwords from Log-in page – hydra (Post method)
- How to guess the passwords from Log-in page – hydra (Get method)
Mutillidae
- How to bypass authentication using SQLi
- How to extract data due to vulnerability of SQLi
- How to inject shell scrips via SQLi
- How to run SQLMAP (Kali) on Windows
- How to exploit SQLi using SQLMAP via TOR
- How to demonstrate Reflected Cross-Site Scripting (Get method)
- How to demonstrate Reflected Cross-Site Scripting (Post method)
- How to demonstrate Phishing with Data URI
Information Gathering
Malicious File upload
Cross Domain
- How to demonstrate ClickJacking with Jack
- How to demonstrate ClickJacking (Online)
- How to defend against Clickjacking (PHP)
- How to bypass Frame busting – Clickjacking (Javascript)
Input validation
- How to exploit Local File Inclusion (LFI) – skuzzy
- How to exploit Remote File Inclusion (RFI) – skuzzy
- How to inject the malicoius script into Excel/CSV
Reverse shell
Fortinet web partal
CORS
CTF