Penetration Testing
Penetration Testing
Testing,
Beginners
To
Expert!
Note - Some of the links may get 404 in future. It would be helpful if you can provide the
replacement of those broken links in the issue section.
Content List:
Phase 1 – History
Phase 2 – Web and Server Technology
Phase 3 – Setting up the lab with BurpSuite and bWAPP
Phase 4 – Mapping the application and attack surface
Phase 5 – Understanding and exploiting OWASP top 10 vulnerabilities
Phase 6 – Session management testing
Phase 7 – Bypassing client-side controls
Phase 8 – Attacking authentication/login
Phase 9 - Attacking access controls (IDOR, Priv esc, hidden files and directories)
Phase 10 – Attacking Input validations (All injections, XSS and mics)
Phase 11 – Generating and testing error codes
Phase 12 – Weak cryptography testing
Phase 13 – Business logic vulnerability
Spidering -
https://www.youtube.com/watch?v=97uMUQGIe14&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YG
zV&index=5
Intruder -
https://www.youtube.com/watch?v=wtMg9oEMTa8&list=PLv95pq8fEyuivHeZB2jeC435tU3_1YG
zV&index=9
Payload settings -
https://www.youtube.com/watch?v=5GpdlbtL-1Q&index=11&list=PLv95pq8fEyuivHeZB2jeC435t
U3_1YGzV
Intruder settings -
https://www.youtube.com/watch?v=B_Mu7jmOYnU&list=PLv95pq8fEyuivHeZB2jeC435tU3_1Y
GzV&index=12
General concept -
https://www.youtube.com/watch?v=udl4oqr_ylM&list=PLq9n8iqQJFDrwFe9AEDBlR1uSHEN7eg
QA&index=3
Proxy module -
https://www.youtube.com/watch?v=PDTwYFkjQBE&list=PLq9n8iqQJFDrwFe9AEDBlR1uSHEN
7egQA&index=4
Repeater module -
https://www.youtube.com/watch?v=9Zh_7s5csCc&list=PLq9n8iqQJFDrwFe9AEDBlR1uSHEN7e
gQA&index=5
IBM
Injection -
https://www.youtube.com/watch?v=02mLrFVzIYU&index=1&list=PLoyY7ZjHtUUVLs2fy-ctzZDS
PpawuQ28d
Cross-site scripting -
https://www.youtube.com/watch?v=x6I5fCupLLU&index=3&list=PLoyY7ZjHtUUVLs2fy-ctzZDSP
pawuQ28d
Security misconfiguration -
https://www.youtube.com/watch?v=cIplXL8idyo&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d
&index=5
F5 CENTRAL
Injection -
https://www.youtube.com/watch?v=rWHvp7rUka8&index=1&list=PLyqga7AXMtPPuibxp1N0Tdy
DrKwP9H_jD
Insecure deserialisation -
https://www.youtube.com/watch?v=nkTBwbnfesQ&index=8&list=PLyqga7AXMtPPuibxp1N0Tdy
DrKwP9H_jD
Cross-site scripting -
https://www.youtube.com/watch?v=IuzU4y-UjLw&index=7&list=PLyqga7AXMtPPuibxp1N0TdyD
rKwP9H_jD
Security misconfiguration -
https://www.youtube.com/watch?v=JuGSUMtKTPU&index=6&list=PLyqga7AXMtPPuibxp1N0Td
yDrKwP9H_jD
LUKE BRINER
Injection explained -
https://www.youtube.com/watch?v=1qMggPJpRXM&index=1&list=PLpNYlUeSK_rkrrBox-xvSkm
5lgaDqKa0X
Cross-site scripting -
https://www.youtube.com/watch?v=ksM-xXeDUNs&index=3&list=PLpNYlUeSK_rkrrBox-xvSkm5
lgaDqKa0X
Security misconfiguration -
https://www.youtube.com/watch?v=DfFPHKPCofY&index=5&list=PLpNYlUeSK_rkrrBox-xvSkm5
lgaDqKa0X
Insecure distribution of credentials - When you register in any website or you request for a
password reset using forgot password feature, if the website sends your username and
password over the email in cleartext without sending the password reset link, then it is a
vulnerability.
Phase 9 - Attacking access controls (IDOR, Priv esc, hidden files and directories)
Completely unprotected functionalities
Finding admin panel - https://www.youtube.com/watch?v=r1k2lgvK3s0
Privilege escalation
What is privilege escalation - https://www.youtube.com/watch?v=80RzLSrczmc
SQL injection
Part 1 - Install SQLi lab -
https://www.youtube.com/watch?v=NJ9AA1_t1Ic&index=23&list=PLkiAz1NPnw8qEgzS7cgVMK
avvOAdogsro
Part 2 - SQL lab series -
https://www.youtube.com/watch?v=TA2h_kUqfhU&index=22&list=PLkiAz1NPnw8qEgzS7cgVM
KavvOAdogsro
Introduction to SQL vs NoSQL - Difference between MySQL and MongoDB with tutorial -
https://www.youtube.com/watch?v=QwevGzVu_zk
LDAP injection
Introduction and practical 1 - https://www.youtube.com/watch?v=-TXFlg7S9ks
Practical 2 - https://www.youtube.com/watch?v=wtahzm_R8e4
OS command injection
OS command injection in bWAPP - https://www.youtube.com/watch?v=qLIkGJrMY9k
HTTP splitting/smuggling
Detailed introduction - https://www.youtube.com/watch?v=bVaZWHrfiPw
Demo 1 - https://www.youtube.com/watch?v=mOf4H1aLiiE
https://www.youtube.com/watch?v=LDF6OkcvBzM
The Difficulties Finding Business Logic Vulnerabilities with Traditional Security Tools -
https://www.youtube.com/watch?v=JTMg0bhkUbo&list=PLWoDr1kTbIxKZe_JeTDIcD2I7Uy1pLI
FI&index=2
Demo 1 - https://www.youtube.com/watch?v=yV7O-QRyOao
Demo 2 - https://www.youtube.com/watch?v=mzjTG7pKmQI
Demo 3 - https://www.youtube.com/watch?v=A8V_58QZPMs
Demo 4 - https://www.youtube.com/watch?v=1pvrEKAFJyk
Demo 5 - https://hackerone.com/reports/145745
Demo 6 - https://hackerone.com/reports/430854
Follow :
https://www.linkedin.com/in/goverdhankumar
https://linktr.ee/g0v3rdh4n