Download Free Ethical Hacking & Reverse Engineering Course
Learn Ethical Hacking & Reverse Engineering Free with Practical Demos, Reverse CrackMes & Website Attacks, No Cost Download Today
Chapter-wise Video Courses With Playlists
We Offer Video Courses Organized Chapter By Chapter For Easy Learning. Each Chapter Includes A Dedicated Playlist, So You Can Access All Related Videos In One Place. You Can Browse Through The List, Choose The Chapter You’re Interested In, And Select Any Video From The Playlist. Our Responsive Video Player Appears on The Same Page, Letting You Watch Your Selected Video Without Navigating Away. You Can Switch Between Chapters or Videos Anytime With Just One Click. We Designed This Layout To Save Your Time And Give You Full Control Over What You Want To Learn And When. Whether You’re Revisiting A Topic or Starting Fresh, Our Organized Structure Helps You Find Exactly What You Need Quickly. Enjoy Smooth Playback, Instant Video Switching, And A Clean Viewing Experience, All In One Convenient Page.
01 – New Introduction: 1 – Introduction
Chapter 01
1 – Introduction
2 – Registering for an account with defendthewebnet
3 – How to use this Guide
Chapter 02
4 – Intro 1 Client code information leak
5 – NEW Intro 2 HTML tag information leak
6 – Intro 3 Javascript code information leak
7 – Intro 4 Path traversal vulnerability
8 – Intro 5 Javascript prompt function information leak
9 – NEW Intro 6 Client code modification vulnerability
10 – NEW Intro 7 robotstxt data leak vulnerability
11 – Intro 8 Path traversal vulnerability
12 – Intro 9 Client code modification vulnerability
13 – Intro 10 Javascript code exposure and decryption
14 – Intro 11 File redirection vulnerability
15 – Intro 12 MD5 decryption
Chapter 03
16 – 24bit File extension manipulation exploit
Chapter 04
17 – World of PeacecraftRealistic Dumpster diving for emails
Chapter 05
18 – Secure Agent Browser Spoofing
Chapter 06
19 – Crypt1Crypt Reverse encryption
Chapter 07
20 – Beach Steganography analyis
Chapter 08
21 – Squashed imageStego Cracking steganography
Chapter 09
22 – HTTP MethodIntro HTTP POST exploit Bypassing CSRFtoken protection
Chapter 10
23 – Library GatewayRealistic Javascript code exposure vulnerability
Chapter 11
24 – SidIntro Cookie tampering to bypass login
Chapter 12
25 – Crypt2Crypt Cracking Caeser Cipher encryption
Chapter 13
26 – NEW Crypt3Crypt Decoding Morse Code
Chapter 14
27 – SQLi1SQLi Bypassing login page password using SQL Injection Attack
Chapter 15
28 – Recon Information gathering skills including B6Keys
Chapter 16
29 – Crypt4Crypt Decrypting ciphertext using online decryptors
Chapter 17
30 – Map It Portscanning and gaining remote access
Chapter 18
31 – Crypt5Crypt Reversing Decrypting ciphertext using online decryptors
Chapter 19
32 – NEW SQLi2SQLi Hacking admin username password using SQL Injection Attack
Chapter 20
33 – NEW Princess SlagRealistic Directory traversal attack null byte attacks
Chapter 21
34 – Xmas 08Realistic Website defacement attacks
Chapter 22
35 – Planet BidRealistic Password reminder exploits
Chapter 23
36 – Access Logs Log Injection Attack
Chapter 24
37 – Sandra Murphy XML Injection Attack
Chapter 25
38 – AlphabetizeCoding Using Javascript coding to defeat countdown timer
Chapter 26
39 – AliensStego Decoding wav files to extract passwords
Chapter 27
40 – Custom EncodingCoding Decryption hacking website countdown timer
Chapter 28
41 – Missile codesForensics Analyzing and extracting data from disk images
Chapter 29
42 – Introduction to Captcha1 challenge
43 – Downloading and Installing an OCR software
44 – Using Abby OCR tool to convert image to text
45 – Download and install AutoIt Automation tool
46 – Using AutoIt
Chapter 30
47 – Intro to Captcha2 challenge
48 – Collecting key images
49 – Splitting the captcha image into 15 sample files
50 – Installing nodejs
51 – Intro to Nodejs
52 – Using nodejs to decode captcha image
53 – Using AutoIt to defeat countdown timer
Chapter 31
54 – Introduction to the Captcha3 challenge
55 – Installing and Using Python
56 – Installing Pillow library for Python Image Manipulation
57 – Collecting key images
58 – Splitting the captcha3 sample using python
59 – Creating nodejs script to decode captcha sample images
60 – Using AutoIt to automate tasks and defeat timer limitation
Chapter 32
61 – Introduction to crackmes
Chapter 33
62 – Downloading and installing x64dbg and Detect It Easy DIE
Chapter 34
63 – Setting up your cracking workspace and workflow
Chapter 35
64 – Debugger Stepping Basics
Chapter 36
65 – Stepping Into Calls
Chapter 37
66 – Breakpoints
67 – Setting Breakpoints on Strings
Chapter 38
68 – Reversing Jumps
Chapter 39
69 – How to patch a program
70 – Patching with Jumps
Chapter 40
71 – The 5 steps of cracking software
Chapter 41
72 – Introduction to cracking guibased programs
Chapter 42
73 – Analyzing the PE for a guibased program
Chapter 43
74 – Setting up x64dbg
75 – Crack the Serial Key using BP on strings
Chapter 44
76 – Window api functions
77 – Pushing parameters to the stack
Chapter 45
78 – Patching to bypass wrong serial key message
79 – Bypassing using xor assembly
Chapter 46
80 – Bonus Lecture
Download Complete Course Pack
Please Download The Complete Course Pack, Which Includes Subtitle Files And Any Available Bonus Content. Some Course Packs Also Contain Assets And Bonus Materials, But Not All of Them. Before You Download, Make Sure To Open And Read The Notepad File Attached On The Download Page. It Provides Important Details About What Each Course Pack Includes.