Certified Pentesting Expert™ is specially designed for the Penetration Testing & Vulnerability Assessment. The certification focuses on the deep knowledge of web hacking techniques and methodologies.
How to install kali machine Part 1
How to install kali machine Part 2
Update Kali Machine
How to setup and configure the Metasploitable Server?
How Website works?
How a Website can be hacked?
OSI Model
Why Information Gathering?
Find vulnerable ports with Nmap
Nmap Advanced Part 1
Nmap Advanced Part 2
Nmap Advanced Part 3
Getting Publicly Available Information
Whois Lookup
How to use Netcraft
How to use Robtex
Collecting Subdomain
Scan for all the files and Directory
Using whatweb in kali
Introduction to VAPT
SQl Injection in Login
SQL Injection in Get Method
Blind SQL Injection
Using Component with Known Vulnerability
Cross Site Scripting
Beef XSS
Setting up foxy proxy
What is Session?
Broken Authentication & Session Management
Android Phone Pen Testing
Code Execution Vulnerability Part 1
Code Execution Vulnerability Part 2
Local File Inclusion Part 1
Local File Inclusion Part 2
Local File Inclusion Part 3
Remote file Inclusion Part 1
Remote file Inclusion Part 2
File Upload Vulnerability with Burp
Acunetix
OWASP-Zap
Vega