No. | Videos in Exploit Research Megaprimer |
---|---|
1 | Exploit Research Megaprimer Part 1 Topic Introduction by Vivek |
2 | Exploit Research Megaprimer Part 2 Memcpy Buffer Overflow |
3 | Exploit Research Megaprimer Part 3 Strcpy Buffer Overflow |
4 | Exploit Research Megaprimer Part 4 Minishare Buffer Overflow |
5 | Exploit Research Megaprimer Part 5 FreeSSHD Buffer Overflow |
6 | Exploit Research Megaprimer Part 6 SEH Basics |
7 | Exploit Research Megaprimer Part 7 Overwrite SEH |
8 | Exploit Research Megaprimer Part 8 Exploiting SEH |
No. | Videos in SecurityTube Python Scripting Expert |
---|---|
1 | SecurityTube Python Scripting Expert (SPSE) Course and Certification |
2 | SecurityTube Python Scripting Expert Course Introduction Video |
3 | SPSE Sample Video: Module 1-1: Introduction to Python and Setting up the Environment |
4 | SPSE Sample Video: Module 5 Exploitation Techniques - Part 5 Processes in Depth |
No. | Videos in SecurityTube Metasploit Framework Expert (SMFE) Course Material |
---|---|
1 | SecurityTube Metasploit Framework Expert Part 1 (Exploitation Basics) |
2 | SecurityTube Metasploit Framework Expert Part 2 ( Why Metasploit? ) |
3 | SecurityTube Metasploit Framework Expert Part 3 ( Meterpreter Basics ) |
4 | SecurityTube Metasploit Framework Expert ( Armitage ) |
5 | SecurityTube Metasploit Framework Expert Part 4 (Framework Organization) |
6 | SecurityTube Metasploit Framework Expert Part 5 (Post Exploitation Kung-Fu) |
7 | SecurityTube Metasploit Framework Expert Part 6 (Post Exploitation Privilege Escalation) |
8 | SecurityTube Metasploit Framework Expert Part 7 (Killing AV and Disabling Firewall) |
9 | SecurityTube Metasploit Framework Expert Part 8 (Stdapi and Priv Extensions) |
10 | SecurityTube Metasploit Framework Expert Part 9 (Token Stealing and Incognito) |
11 | SecurityTube Metasploit Framework Expert Part 10 (Espia and Sniffer Extensions in Post Exploitation) |
12 | SecurityTube Metasploit Framework Expert Part 11 (Post Exploitation Backdoors) |
13 | SecurityTube Metasploit Framework Expert Part 12 (Pivoting after Post Exploitation) |
14 | SecurityTube Metasploit Framework Expert Part 13 (Port Forwarding as part of Post Exploitation) |
15 | SecurityTube Metasploit Framework Expert Part 14 (Client Side Exploits) |
16 | SecurityTube Metasploit Framework Expert Part 15 (Backdoors and Rootkits in Post Exploitation) |
17 | SecurityTube Metasploit Framework Expert Part 16 (Exploit Research with Metasploit) |
18 | SecurityTube Metasploit Framework Expert Part 17 (Railgun Basics) |
19 | SecurityTube Metasploit Framework Expert Part 18 (Railgun Adding Functions) |
20 | SecurityTube Metasploit Framework Expert Part 19 (Railgun Adding New DLLs) |
21 | SecurityTube Metasploit Framework Expert Part 19A (Railgun Adding New DLLs on Windows 7) |
22 | SecurityTube Metasploit Framework Expert Part 20 (Resource Scripts) |
23 | SecurityTube Metasploit Framework Expert Part 21 (Database Support) |
24 | SecurityTube Metasploit Framework Expert Part 22 (Using Plugins) |
25 | SecurityTube Metasploit Framework Expert Part 23 (Meterpreter API Basics) |
26 | SecurityTube Metasploit Framework Expert Part 24 (Meterpreter Scripting Migrate Clone) |
27 | SecurityTube Metasploit Framework Expert Part 25 (Meterpreter Scripting Process Name Search) |
No. | Videos in Wireless LAN Security and Penetration Testing Megaprimer |
---|---|
1 | Wireless LAN Security Megaprimer Part 1: Getting Started |
2 | Wireless LAN Security Megaprimer Part 2: Bands, Channels and Sniffing |
3 | Wireless LAN Security Megaprimer Part 3: Pwning Beacon Frames |
4 | Wireless LAN Security Megaprimer Part 4: Dissecting AP-Client Connections |
5 | Wireless LAN Security Megaprimer Part 5:Dissecting WLAN Headers |
6 | Wireless LAN Security Megaprimer Part 6: Pwning Hidden SSIDs |
7 | Wireless LAN Security Megaprimer Part 7: Laughing Off MAC Filters |
8 | Wireless LAN Security Megaprimer Part 8: Hacking WLAN Authentication |
9 | Wireless LAN Security Megaprimer Part 9: Hotspot Attacks |
10 | Wireless LAN Security Megaprimer Part 10: Hacking Isolated Clients |
11 | Wireless LAN Security Megaprimer Part 11:Alfa Card Kung-Fu |
12 | Wireless LAN Security Megaprimer Part 12: Man-in-the-Middle Attack |
13 | SSL MITM Attack Over Wireless |
14 | SSL MITM Attack Over Wireless Demo |
15 | Wireless LAN Security Megaprimer Part 13 : SSL Man-in-the-Middle Attacks |
16 | Custom Wireless Regulation Database |
17 | Wireless LAN Security Megaprimer Part 14: WEP In-Depth |
18 | Wireless LAN Security Megaprimer Part 15: WEP Cracking |
19 | Wireless LAN Security Megaprimer Part 16: Caffe Latte Attack Basics |
20 | Wireless LAN Security Megaprimer Part 17: Caffe Latte Attack Demo |
21 | Caffe Latte Attack on the iPhone |
22 | Wireless LAN Security Megaprimer Part 18: KoreK's ChopChop Attack |
23 | Wireless LAN Security Megaprimer Part 19: Fragmentation and Hirte Attack |
24 | Wireless LAN Security Megaprimer Part 20: Understanding WPA/WPA2 |
25 | Wi-Fi Challenge 1 (Level Easy) : There is no Patch for Stupidity! |
26 | Wi-Fi Challenge 1 Solution : There is no Patch for Stupidity! |
27 | Wi-Fi Challenge 2 (Level - Intermediate) : Know Thy Packets |
28 | Wi-Fi Challenge 2 Solution : Know Thy Packets |
29 | Wi-Fi Challenge 3 (Level Advanced): Never Underestimate your Enemy! |
30 | Wireless LAN Security Megaprimer Part 22: WPA-PSK |
31 | Wireless LAN Security Megaprimer Part 22: WPA-PSK Cracking |
32 | Wireless LAN Security Megaprimer Part 23: WPA2-PSK Cracking |
33 | Wireless LAN Security Megaprimer Part 24: Speeding up WPA/WPA2 PSK Cracking |
34 | Wi-Fi Challenge 3 Solution: Never Underestimate Your Enemy! |
35 | WLAN Security Megaprimer Part 25: Mood Swings of a Wandering Client |
36 | Wlan Security Megaprimer Part 26: Cracking WPA/WPA2-PSK with just the Client |
37 | WLAN Security Megaprimer: Questions and Answers |
38 | Wireless Lan Security Megaprimer Part 28: Wpa_Supplicant |
39 | Wireless Lan Security Megaprimer Challenge 4: Crack WPA-Personal with only AP |
40 | Wireless Lan Security Megaprimer 29: Setting up FreeRadius-WPE on Backtrack |
41 | Wireless Lan Security Megaprimer 30: EAP-MD5 Basics and Demo |
42 | Wireless Lan Security Megaprimer 31: Cracking EAP-MD5 with Eapmd5pass and Eapmd5crack |
43 | Wireless Lan Security Megaprimer 32: EAP Types and PEAP Demo |
44 | Wireless Lan Security Megaprimer 33: Cracking PEAP |
45 | Wireless Lan Security Megaprimer 34: Cracking PEAP in a Windows Network |
46 | Wireless Lan Security Megaprimer 35: Cracking EAP-TTLS |
47 | Wireless Lan Security Megaprimer 36: Insecurity in 3rd Party Wi-Fi Utilities |
48 | Wireless Lan Security Megaprimer : Conclusion and the Road Ahead |
49 | Windows WIreless Kung-Fu (SWSE Addendum 1) |
50 | Creating Wireless Backdoors (SWSE Addendum 2) |
51 | Malware, Metasploit and the Hosted Network (SWSE Addendum 3) |
52 | SecurityTube Certified Wi-Fi Security Expert (SWSE) Student Portal Launch |
No. | Videos in Metasploit Megaprimer |
---|---|
1 | Metasploit Megaprimer (Exploitation Basics and need for Metasploit) Part 1 |
2 | Metasploit Megaprimer (Getting Started with Metasploit) Part 2 |
3 | Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi) |
4 | Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv) |
5 | Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito) |
6 | Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts) |
7 | Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation) |
8 | Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu) |
9 | Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation) |
10 | Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing) |
11 | Metasploit Megaprimer (Post Exploitation and Stealing Data) Part 11 |
12 | Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits) |
13 | Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding) |
14 | Metasploit Megaprimer Part 14 (Backdooring Executables) |
15 | Metasploit Megaprimer Part 15 (Auxiliary Modules) |
16 | Metasploit Megaprimer Part 16 (Pass the Hash Attack) |
17 | Metasploit Megaprimer Part 17 (Scenario Based Hacking) |
No. | Videos in Windows Assembly Language Megaprimer |
---|---|
1 | Windows Assembly Language Primer Part 1 (Processor Modes) |
2 | Windows Assembly Language Primer for Hackers Part 2 (Protected Mode Assembly) |
3 | Windows Assembly Language Primer for Hackers Part 3 (Win32 ASM using MASM32) |
4 | Windows Assembly Language Primer for Hackers Part 4 (MASM Data Types) |
5 | Windows Assembly Language Primer for Hackers Part 5 (Procedures) |
6 | Windows Assembly Language Primer for Hackers Part 6 (Macros) |
7 | Windows Assembly Language Primer for Hackers Part 7 (Program Control using JMP) |
8 | Windows Assembly Language Primer for Hackers Part 8 (Decision Directives) |
9 | Windows Assembly Language Primer for Hackers Part 9 (Loops) |
No. | Videos in Assembly Language Megaprimer for Linux |
---|---|
1 | Assembly Primer for Hackers (Part 1) System Organization |
2 | Assembly Primer for Hackers (Part 2) Virtual Memory Organization |
3 | Assembly Primer for Hackers (Part 3) GDB Usage Primer |
4 | Assembly Primer for Hackers (Part 4) Hello World |
5 | Assembly Primer for Hackers (Part 5) Data Types |
6 | Assembly Primer for Hackers (Part 6) Moving Data |
7 | Assembly Primer for Hackers (Part 7) Working with Strings |
8 | Assembly Primer for Hackers (Part 8) Unconditional Branching |
9 | Assembly Primer for Hackers (Part 9) Conditional Branching |
10 | Assembly Primer for Hackers (Part 10) Functions |
11 | Assembly Primer for Hackers (Part 11) Functions Stack |
No. | Videos in Buffer Overflow Exploitation Megaprimer for Linux |
---|---|
1 | Buffer Overflow Primer Part 1 (Smashing the Stack) |
2 | Buffer Overflow Primer Part 2 (Writing Exit Shellcode) |
3 | Buffer Overflow Primer Part 3 (Executing Shellcode) |
4 | Buffer Overflow Primer Part 4 (Disassembling Execve) |
5 | Buffer Overflow Primer Part 5 (Shellcode for Execve) |
6 | Buffer Overflow Primer Part 6 (Exploiting a Program) |
7 | Buffer Overflow Primer Part 7 (Exploiting a Program Demo) |
8 | Buffer Overflow Primer Part 8 (Return to Libc Theory) |
9 | Buffer Overflow Primer Part 9 (Return to Libc Demo) |
No. | Videos in Format String Vulnerabilities Megaprimer |
---|---|
1 | Format String Vulnerabilities Primer (Part 1 The Basics) |
2 | Format String Vulnerabilities Primer (Part 2 Understanding Format Functions) |
3 | Format String Vulnerabilities Primer (Part 3 Crashing the Program) |
4 | Format String Vulnerabilities Primer (Part 4 Viewing the Stack) |
No. | Videos in Scenario Based Hacking and Penetration Testing |
---|---|
1 | Scenario Based Hacking Part 1 (No Patches, No AV, Direct Access) |
2 | Scenario Based Hacking Part 2a (No Patches, No AV, Behind NAT) |
3 | Scenario Based Hacking Part 3 (OS Patched, No AV, Behind NAT) |
4 | Scenario Based Hacking Part 4 (OS and Software Patched, No AV, Behind NAT) |
No. | Videos in Router Hacking Series |
---|---|
1 | Router Hacking Part 1 (The Basics) |
2 | Router Hacking Part 2 (Service Enumeration, Fingerprinting and Default Accounts) |
3 | Router Hacking Part 3 (Bruteforcing and Dictionary Attacks with Hydra) |
4 | Router Hacking Part 4 (SNMP Attacks using SNMPCheck) |
5 | Router Hacking Part 5 (SNMP Attacks using SNMPEnum) |
6 | Router Hacking Part 6 (Dictionary Attack using Metasploit on SNMP) |