Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Complete Ethical Hacking & Reverse Engineering
Introduction
1. Introduction (4:04)
2. Registering for an account with defendtheweb.net (1:44)
3. How to use this Guide (3:38)
Intro Levels
1. Intro 1 (Client code information leak) (3:28)
2. [NEW] Intro 2 (HTML tag information leak) (3:18)
3. Intro 3 (Javascript code information leak) (10:30)
4. Intro 4 (Path traversal vulnerability) (4:03)
5. Intro 5 (Javascript prompt() function information leak) (2:05)
6. [NEW] Intro 6 (Client code modification vulnerability) (3:50)
7. [NEW] Intro 7 (robots.txt data leak vulnerability) (3:05)
8. Intro 8 (Path traversal vulnerability) (9:41)
9. Intro 9 (Client code modification vulnerability) (3:54)
10. Intro 10 (Javascript code exposure and decryption) (2:52)
11. Intro 11 (File redirection vulnerability) (2:25)
12. Intro 12 (MD5 decryption) (1:31)
24-bit (File extension manipulation exploit)
1. 24-bit (File extension manipulation exploit) (2:49)
Word of PeacecraftRealistic (Dumpster diving for emails)
1WORLD~1 (3:47)
Secure Agent (Browser Spoofing)
1. Secure Agent (Browser Spoofing) (1:56)
Crypt1Crypt (Reverse encryption)
1. Crypt1Crypt (Reverse encryption) (1:46)
Beach (Steganography analyis)
1. Beach (Steganography analyis) (3:32)
Squashed imageStego (Cracking steganography)
1. Squashed imageStego (Cracking steganography) (1:53)
HTTP MethodIntro (HTTP POST exploit & Bypass CSRF-token protection)
1HTTPM~1 (10:34)
Library GatewayRealistic (Javascript code exposure vulnerability)
1. Library GatewayRealistic (Javascript code exposure vulnerability) (3:53)
SidIntro (Cookie tampering to bypass login)
1. SidIntro (Cookie tampering to bypass login) (2:17)
Crypt2Crypt (Cracking Caeser Cipher encryption)
1. Crypt2Crypt (Cracking Caeser Cipher encryption) (2:39)
Crypt3Crypt (Decoding Morse Code)
1. [NEW] Crypt3Crypt (Decoding Morse Code) (4:49)
SQLi1SQLi (Bypassing login page password using SQL Injection Attack)
1. SQLi1SQLi (Bypassing login page password using SQL Injection Attack) (7:41)
Recon (Information gathering skills, including B6-Key)
1. Recon (Information gathering skills, including B6-Keys) (4:33)
Crypt4Crypt (Decrypting ciphertext using online decryptors)
1. Crypt4Crypt (Decrypting ciphertext using online decryptors) (2:20)
Map It (Portscanning and gaining remote access)
1. Map It (Portscanning and gaining remote access) (4:38)
Crypt5Crypt (Reverse & Decrypt ciphertext using online decryptor)
1. Crypt5Crypt (Reversing & Decrypting ciphertext using online decryptors) (3:13)
SQLi (Hacking admin username & password using SQL Injection Attack)
1. [NEW] SQLi2SQLi (Hacking admin username & password using SQL Injection Attack) (10:06)
Princess SlagRealistic (Directory traversal & null byte attacks)
1. [NEW] Princess SlagRealistic (Directory traversal attack & null byte attacks) (7:34)
21. [new] Xmas '08Realistic (Website defacement attacks)
1. Xmas '08Realistic (Website defacement attacks) (9:48)
Planet BidRealistic (Password reminder exploits)
1. Planet BidRealistic (Password reminder exploits) (16:11)
23. [new] Access Logs (Log Injection Attack)
1. Access Logs (Log Injection Attack) (4:31)
24. [new] Sandra Murphy (XML Injection Attack)
1. Sandra Murphy (XML Injection Attack) (4:33)
AlphabetizeCoding (Using Javascript to defeat countdown timer)
1. AlphabetizeCoding (Using Javascript coding to defeat countdown timer) (10:35)
AliensStego (Decoding wav files to extract passwords)
1. AliensStego (Decoding wav files to extract passwords) (7:25)
27. [new] Custom EncodingCoding (Decryption & hacking website countdown timer)
1. Custom EncodingCoding (Decryption & hacking website countdown timer) (12:50)
Missile codesForensics (Analyze & extract data from disk images)
1. Missile codesForensics (Analyzing and extracting data from disk images) (19:39)
Captcha1CAPTCHA (Hacking Captcha using OCR and AutoIt)
1. Introduction to Captcha1 challenge (2:51)
2. Downloading and Installing an OCR software (2:08)
3. Using Abby (OCR tool) to convert image to text (2:43)
4. Download and install AutoIt (Automation tool) (2:43)
5. Using AutoIt (21:02)
Captcha2CAPTCHA (Hack Captcha with node.js, imagemagick & AutoIt )
1. Intro to Captcha2 challenge (7:06)
2. Collecting key images (13:39)
3SPLIT~1 (3:21)
4. Installing node.js (2:40)
5. Intro to Node.js (3:47)
6. Using node.js to decode captcha image (10:00)
7. Using AutoIt to defeat countdown timer (10:04)
Captcha3CAPTCHA (Using Python to hack Captcha )
1. Introduction to the Captcha3 challenge (3:14)
2. Installing and Using Python (11:36)
3. Installing Pillow library for Python Image Manipulation (7:27)
4. Collecting key images (17:22)
5. Splitting the captcha3 sample using python (2:34)
6. Creating nodejs script to decode captcha sample images (5:07)
7. Using AutoIt to automate tasks and defeat timer limitation (3:54)
32. Introduction to Software Cracking with crackme's
1. Introduction to crackme's (1:56)
33. Introduction to x64dbg and Detect it Easy (DIE)
1. Downloading and installing x64dbg and Detect It Easy (DIE) (5:22)
34. Setting up your cracking workspace and workflow
1. Setting up your cracking workspace and workflow (11:35)
35. Debugger Stepping Basics
1. Debugger Stepping Basics (26:37)
36. Stepping Into Calls
1. Stepping Into Calls (19:23)
37. Breakpoints
1. Breakpoints (6:46)
2. Setting Breakpoints on Strings (10:03)
38. Reversing Jumps
1. Reversing Jumps (9:21)
39. How to patch a program
1. How to patch a program (12:25)
2. Patching with Jumps (7:29)
40. Summary of Cracking Software Workflow
1. The 5 steps of cracking software (4:52)
41. Introduction to cracking gui-based programs
1. Introduction to cracking gui-based programs (4:02)
42. Analyzing the PE for a gui-based program
1. Analyzing the PE for a gui-based program (3:42)
43. Crack the Serial Key using BP on strings
1. Setting up x64dbg (1:35)
2. Crack the Serial Key using BP on strings (8:31)
44. Windows api functions & the stack
1. Window api functions (6:58)
2. Pushing parameters to the stack (6:49)
45. Patching to bypass wrong serial key message
1. Patching to bypass wrong serial key message (11:33)
2. Bypassing using xor assembly (10:14)
46. Bonus Lecture
1. Bonus Lecture (1:48)
Teach online with
2. Pushing parameters to the stack
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock