Learn Ethical Hacking & Reverse Engineering

Download Free Ethical Hacking & Reverse Engineering Course

Learn Ethical Hacking & Reverse Engineering Free with Practical Demos, Reverse CrackMes & Website Attacks, No Cost Download Today

Chapter-wise Video Courses With Playlists

We Offer Video Courses Organized Chapter By Chapter For Easy Learning. Each Chapter Includes A Dedicated Playlist, So You Can Access All Related Videos In One Place. You Can Browse Through The List, Choose The Chapter You’re Interested In, And Select Any Video From The Playlist. Our Responsive Video Player Appears on The Same Page, Letting You Watch Your Selected Video Without Navigating Away. You Can Switch Between Chapters or Videos Anytime With Just One Click. We Designed This Layout To Save Your Time And Give You Full Control Over What You Want To Learn And When. Whether You’re Revisiting A Topic or Starting Fresh, Our Organized Structure Helps You Find Exactly What You Need Quickly. Enjoy Smooth Playback, Instant Video Switching, And A Clean Viewing Experience, All In One Convenient Page.

01 – New Introduction: 1 – Introduction


Chapter 01

  • 1 - Introduction1 – Introduction
  • 2 - Registering for an account with defendthewebnet2 – Registering for an account with defendthewebnet
  • 3 - How to use this Guide3 – How to use this Guide

Chapter 02

  • 4 - Intro 1 Client code information leak4 – Intro 1 Client code information leak
  • 5 - NEW Intro 2 HTML tag information leak5 – NEW Intro 2 HTML tag information leak
  • 6 - Intro 3 Javascript code information leak6 – Intro 3 Javascript code information leak
  • 7 - Intro 4 Path traversal vulnerability7 – Intro 4 Path traversal vulnerability
  • 8 - Intro 5 Javascript prompt function information leak8 – Intro 5 Javascript prompt function information leak
  • 9 - NEW Intro 6 Client code modification vulnerability9 – NEW Intro 6 Client code modification vulnerability
  • 10 - NEW Intro 7 robotstxt data leak vulnerability10 – NEW Intro 7 robotstxt data leak vulnerability
  • 11 - Intro 8 Path traversal vulnerability11 – Intro 8 Path traversal vulnerability
  • 12 - Intro 9 Client code modification vulnerability12 – Intro 9 Client code modification vulnerability
  • 13 - Intro 10 Javascript code exposure and decryption13 – Intro 10 Javascript code exposure and decryption
  • 14 - Intro 11 File redirection vulnerability14 – Intro 11 File redirection vulnerability
  • 15 - Intro 12 MD5 decryption15 – Intro 12 MD5 decryption

Chapter 03

  • 16 - 24bit File extension manipulation exploit16 – 24bit File extension manipulation exploit

Chapter 04

  • 17 - World of PeacecraftRealistic Dumpster diving for emails17 – World of PeacecraftRealistic Dumpster diving for emails

Chapter 05

  • 18 - Secure Agent Browser Spoofing18 – Secure Agent Browser Spoofing

Chapter 06

  • 19 - Crypt1Crypt Reverse encryption19 – Crypt1Crypt Reverse encryption

Chapter 07

  • 20 - Beach Steganography analyis20 – Beach Steganography analyis

Chapter 08

  • 21 - Squashed imageStego Cracking steganography21 – Squashed imageStego Cracking steganography

Chapter 09

  • 22 - HTTP MethodIntro HTTP POST exploit Bypassing CSRFtoken protection22 – HTTP MethodIntro HTTP POST exploit Bypassing CSRFtoken protection

Chapter 10

  • 23 - Library GatewayRealistic Javascript code exposure vulnerability23 – Library GatewayRealistic Javascript code exposure vulnerability

Chapter 11

  • 24 - SidIntro Cookie tampering to bypass login24 – SidIntro Cookie tampering to bypass login

Chapter 12

  • 25 - Crypt2Crypt Cracking Caeser Cipher encryption25 – Crypt2Crypt Cracking Caeser Cipher encryption

Chapter 13

  • 26 - NEW Crypt3Crypt Decoding Morse Code26 – NEW Crypt3Crypt Decoding Morse Code

Chapter 14

  • 27 - SQLi1SQLi Bypassing login page password using SQL Injection Attack27 – SQLi1SQLi Bypassing login page password using SQL Injection Attack

Chapter 15

  • 28 - Recon Information gathering skills including B6Keys28 – Recon Information gathering skills including B6Keys

Chapter 16

  • 29 - Crypt4Crypt Decrypting ciphertext using online decryptors29 – Crypt4Crypt Decrypting ciphertext using online decryptors

Chapter 17

  • 30 - Map It Portscanning and gaining remote access30 – Map It Portscanning and gaining remote access

Chapter 18

  • 31 - Crypt5Crypt Reversing Decrypting ciphertext using online decryptors31 – Crypt5Crypt Reversing Decrypting ciphertext using online decryptors

Chapter 19

  • 32 - NEW SQLi2SQLi Hacking admin username password using SQL Injection Attack32 – NEW SQLi2SQLi Hacking admin username password using SQL Injection Attack

Chapter 20

  • 33 - NEW Princess SlagRealistic Directory traversal attack null byte attacks33 – NEW Princess SlagRealistic Directory traversal attack null byte attacks

Chapter 21

  • 34 - Xmas 08Realistic Website defacement attacks34 – Xmas 08Realistic Website defacement attacks

Chapter 22

  • 35 - Planet BidRealistic Password reminder exploits35 – Planet BidRealistic Password reminder exploits

Chapter 23

  • 36 - Access Logs Log Injection Attack36 – Access Logs Log Injection Attack

Chapter 24

  • 37 - Sandra Murphy XML Injection Attack37 – Sandra Murphy XML Injection Attack

Chapter 25

  • 38 - AlphabetizeCoding Using Javascript coding to defeat countdown timer38 – AlphabetizeCoding Using Javascript coding to defeat countdown timer

Chapter 26

  • 39 - AliensStego Decoding wav files to extract passwords39 – AliensStego Decoding wav files to extract passwords

Chapter 27

  • 40 - Custom EncodingCoding Decryption hacking website countdown timer40 – Custom EncodingCoding Decryption hacking website countdown timer

Chapter 28

  • 41 - Missile codesForensics Analyzing and extracting data from disk images41 – Missile codesForensics Analyzing and extracting data from disk images

Chapter 29

  • 42 - Introduction to Captcha1 challenge42 – Introduction to Captcha1 challenge
  • 43 - Downloading and Installing an OCR software43 – Downloading and Installing an OCR software
  • 44 - Using Abby OCR tool to convert image to text44 – Using Abby OCR tool to convert image to text
  • 45 - Download and install AutoIt Automation tool45 – Download and install AutoIt Automation tool
  • 46 - Using AutoIt46 – Using AutoIt

Chapter 30

  • 47 - Intro to Captcha2 challenge47 – Intro to Captcha2 challenge
  • 48 - Collecting key images48 – Collecting key images
  • 49 - Splitting the captcha image into 15 sample files49 – Splitting the captcha image into 15 sample files
  • 50 - Installing nodejs50 – Installing nodejs
  • 51 - Intro to Nodejs51 – Intro to Nodejs
  • 52 - Using nodejs to decode captcha image52 – Using nodejs to decode captcha image
  • 53 - Using AutoIt to defeat countdown timer53 – Using AutoIt to defeat countdown timer

Chapter 31

  • 54 - Introduction to the Captcha3 challenge54 – Introduction to the Captcha3 challenge
  • 55 - Installing and Using Python55 – Installing and Using Python
  • 56 - Installing Pillow library for Python Image Manipulation56 – Installing Pillow library for Python Image Manipulation
  • 57 - Collecting key images57 – Collecting key images
  • 58 - Splitting the captcha3 sample using python58 – Splitting the captcha3 sample using python
  • 59 - Creating nodejs script to decode captcha sample images59 – Creating nodejs script to decode captcha sample images
  • 60 - Using AutoIt to automate tasks and defeat timer limitation60 – Using AutoIt to automate tasks and defeat timer limitation

Chapter 32

  • 61 - Introduction to crackmes61 – Introduction to crackmes

Chapter 33

  • 62 - Downloading and installing x64dbg and Detect It Easy DIE62 – Downloading and installing x64dbg and Detect It Easy DIE

Chapter 34

  • 63 - Setting up your cracking workspace and workflow63 – Setting up your cracking workspace and workflow

Chapter 35

  • 64 - Debugger Stepping Basics64 – Debugger Stepping Basics

Chapter 36

  • 65 - Stepping Into Calls65 – Stepping Into Calls

Chapter 37

  • 66 - Breakpoints66 – Breakpoints
  • 67 - Setting Breakpoints on Strings67 – Setting Breakpoints on Strings

Chapter 38

  • 68 - Reversing Jumps68 – Reversing Jumps

Chapter 39

  • 69 - How to patch a program69 – How to patch a program
  • 70 - Patching with Jumps70 – Patching with Jumps

Chapter 40

  • 71 - The 5 steps of cracking software71 – The 5 steps of cracking software

Chapter 41

  • 72 - Introduction to cracking guibased programs72 – Introduction to cracking guibased programs

Chapter 42

  • 73 - Analyzing the PE for a guibased program73 – Analyzing the PE for a guibased program

Chapter 43

  • 74 - Setting up x64dbg74 – Setting up x64dbg
  • 75 - Crack the Serial Key using BP on strings75 – Crack the Serial Key using BP on strings

Chapter 44

  • 76 - Window api functions76 – Window api functions
  • 77 - Pushing parameters to the stack77 – Pushing parameters to the stack

Chapter 45

  • 78 - Patching to bypass wrong serial key message78 – Patching to bypass wrong serial key message
  • 79 - Bypassing using xor assembly79 – Bypassing using xor assembly

Chapter 46

  • 80 - Bonus Lecture80 – Bonus Lecture

Download Complete Course Pack

Please Download The Complete Course Pack, Which Includes Subtitle Files And Any Available Bonus Content. Some Course Packs Also Contain Assets And Bonus Materials, But Not All of Them. Before You Download, Make Sure To Open And Read The Notepad File Attached On The Download Page. It Provides Important Details About What Each Course Pack Includes.

Leave a Reply

Your email address will not be published. Required fields are marked *