BENEFITS
Best Seller
Online Courses
24/7 Support
Lifetime Access
Get Certificate
Course Curriculum
Introduction
Available in
days
days
after you enroll
Intro Levels
Available in
days
days
after you enroll
- 1. Intro 1 (Client code information leak) (3:28)
- 2. [NEW] Intro 2 (HTML tag information leak) (3:18)
- 3. Intro 3 (Javascript code information leak) (10:30)
- 4. Intro 4 (Path traversal vulnerability) (4:03)
- 5. Intro 5 (Javascript prompt() function information leak) (2:05)
- 6. [NEW] Intro 6 (Client code modification vulnerability) (3:50)
- 7. [NEW] Intro 7 (robots.txt data leak vulnerability) (3:05)
- 8. Intro 8 (Path traversal vulnerability) (9:41)
- 9. Intro 9 (Client code modification vulnerability) (3:54)
- 10. Intro 10 (Javascript code exposure and decryption) (2:52)
- 11. Intro 11 (File redirection vulnerability) (2:25)
- 12. Intro 12 (MD5 decryption) (1:31)
24-bit (File extension manipulation exploit)
Available in
days
days
after you enroll
Word of PeacecraftRealistic (Dumpster diving for emails)
Available in
days
days
after you enroll
Secure Agent (Browser Spoofing)
Available in
days
days
after you enroll
Crypt1Crypt (Reverse encryption)
Available in
days
days
after you enroll
Beach (Steganography analyis)
Available in
days
days
after you enroll
Squashed imageStego (Cracking steganography)
Available in
days
days
after you enroll
HTTP MethodIntro (HTTP POST exploit & Bypass CSRF-token protection)
Available in
days
days
after you enroll
Library GatewayRealistic (Javascript code exposure vulnerability)
Available in
days
days
after you enroll
SidIntro (Cookie tampering to bypass login)
Available in
days
days
after you enroll
Crypt2Crypt (Cracking Caeser Cipher encryption)
Available in
days
days
after you enroll
Crypt3Crypt (Decoding Morse Code)
Available in
days
days
after you enroll
SQLi1SQLi (Bypassing login page password using SQL Injection Attack)
Available in
days
days
after you enroll
Recon (Information gathering skills, including B6-Key)
Available in
days
days
after you enroll
Crypt4Crypt (Decrypting ciphertext using online decryptors)
Available in
days
days
after you enroll
Map It (Portscanning and gaining remote access)
Available in
days
days
after you enroll
Crypt5Crypt (Reverse & Decrypt ciphertext using online decryptor)
Available in
days
days
after you enroll
SQLi (Hacking admin username & password using SQL Injection Attack)
Available in
days
days
after you enroll
Princess SlagRealistic (Directory traversal & null byte attacks)
Available in
days
days
after you enroll
21. [new] Xmas '08Realistic (Website defacement attacks)
Available in
days
days
after you enroll
Planet BidRealistic (Password reminder exploits)
Available in
days
days
after you enroll
23. [new] Access Logs (Log Injection Attack)
Available in
days
days
after you enroll
24. [new] Sandra Murphy (XML Injection Attack)
Available in
days
days
after you enroll
AlphabetizeCoding (Using Javascript to defeat countdown timer)
Available in
days
days
after you enroll
AliensStego (Decoding wav files to extract passwords)
Available in
days
days
after you enroll
27. [new] Custom EncodingCoding (Decryption & hacking website countdown timer)
Available in
days
days
after you enroll
Missile codesForensics (Analyze & extract data from disk images)
Available in
days
days
after you enroll
Captcha1CAPTCHA (Hacking Captcha using OCR and AutoIt)
Available in
days
days
after you enroll
Captcha2CAPTCHA (Hack Captcha with node.js, imagemagick & AutoIt )
Available in
days
days
after you enroll
Captcha3CAPTCHA (Using Python to hack Captcha )
Available in
days
days
after you enroll
- 1. Introduction to the Captcha3 challenge (3:14)
- 2. Installing and Using Python (11:36)
- 3. Installing Pillow library for Python Image Manipulation (7:27)
- 4. Collecting key images (17:22)
- 5. Splitting the captcha3 sample using python (2:34)
- 6. Creating nodejs script to decode captcha sample images (5:07)
- 7. Using AutoIt to automate tasks and defeat timer limitation (3:54)
32. Introduction to Software Cracking with crackme's
Available in
days
days
after you enroll
33. Introduction to x64dbg and Detect it Easy (DIE)
Available in
days
days
after you enroll
34. Setting up your cracking workspace and workflow
Available in
days
days
after you enroll
35. Debugger Stepping Basics
Available in
days
days
after you enroll
36. Stepping Into Calls
Available in
days
days
after you enroll
37. Breakpoints
Available in
days
days
after you enroll
38. Reversing Jumps
Available in
days
days
after you enroll
39. How to patch a program
Available in
days
days
after you enroll
40. Summary of Cracking Software Workflow
Available in
days
days
after you enroll
41. Introduction to cracking gui-based programs
Available in
days
days
after you enroll
42. Analyzing the PE for a gui-based program
Available in
days
days
after you enroll
43. Crack the Serial Key using BP on strings
Available in
days
days
after you enroll
44. Windows api functions & the stack
Available in
days
days
after you enroll
45. Patching to bypass wrong serial key message
Available in
days
days
after you enroll
46. Bonus Lecture
Available in
days
days
after you enroll
Offer Ending Soon