Reflected XSS into a JavaScript string with angle brackets HTML encoded (Lab #19)
Ali Sher Shahid
Reflected XSS into a JavaScript string with angle brackets HTML encoded (Lab #19)
5:10
Reflected XSS into a JavaScript string with single quote and backslash escaped (Lab #18)
Ali Sher Shahid
Reflected XSS into a JavaScript string with single quote and backslash escaped (Lab #18)
5:23
Reflected XSS in canonical link tag (Lab #17)
Ali Sher Shahid
Reflected XSS in canonical link tag (Lab #17)
4:54
Stored XSS into anchor href attribute with double quotes HTML encoded (Lab #16)
Ali Sher Shahid
Stored XSS into anchor href attribute with double quotes HTML encoded (Lab #16)
6:20
Reflected XSS into attribute with angle brackets HTML encoded (Lab #15)
Ali Sher Shahid
Reflected XSS into attribute with angle brackets HTML encoded (Lab #15)
6:38
Reflected XSS with some SVG markup allowed (Lab #14)
Ali Sher Shahid
Reflected XSS with some SVG markup allowed (Lab #14)
9:39
Reflected XSS with event handlers and href attributes blocked (Lab #13)
Ali Sher Shahid
Reflected XSS with event handlers and href attributes blocked (Lab #13)
5:33
Lab #12 Reflected XSS into HTML context with all tags blocked except custom ones
Ali Sher Shahid
Lab #12 Reflected XSS into HTML context with all tags blocked except custom ones
5:27
Reflected XSS into HTML context with most tags and attributes blocked (Lab #11)
Ali Sher Shahid
Reflected XSS into HTML context with most tags and attributes blocked (Lab #11)
10:46
Stored DOM XSS (Lab #10)
Ali Sher Shahid
Stored DOM XSS (Lab #10)
5:20
Reflected DOM XSS (Lab #9)
Ali Sher Shahid
Reflected DOM XSS (Lab #9)
6:16
DOM XSS in AngularJS expression with angle brackets and double quotes HTML encoded (Lab #8)
Ali Sher Shahid
DOM XSS in AngularJS expression with angle brackets and double quotes HTML encoded (Lab #8)
4:17
DOM XSS in jQuery selector sink using a hashchange event (Lab #7)
Ali Sher Shahid
DOM XSS in jQuery selector sink using a hashchange event (Lab #7)
5:06
DOM XSS in jQuery anchor href attribute sink using location search source (Lab #6)
Ali Sher Shahid
DOM XSS in jQuery anchor href attribute sink using location search source (Lab #6)
3:56
DOM XSS in innerHTML sink using source location search (Lab #5)
Ali Sher Shahid
DOM XSS in innerHTML sink using source location search (Lab #5)
3:13
DOM XSS in document write sink using source location search inside a select element (Lab #4)
Ali Sher Shahid
DOM XSS in document write sink using source location search inside a select element (Lab #4)
6:25
DOM XSS in document write sink using source location search (Lab #3)
Ali Sher Shahid
DOM XSS in document write sink using source location search (Lab #3)
8:08
Stored XSS into HTML context with nothing encoded (Lab #2)
Ali Sher Shahid
Stored XSS into HTML context with nothing encoded (Lab #2)
3:27
Reflected XSS into HTML context with nothing encoded (Lab #1)
Ali Sher Shahid
Reflected XSS into HTML context with nothing encoded (Lab #1)
5:17
Exploiting XXE to retrieve data by repurposing a local DTD (Lab #9)
Ali Sher Shahid
Exploiting XXE to retrieve data by repurposing a local DTD (Lab #9)
8:20
Exploiting XXE via image file upload (Lab #8) [Hindi]
Ali Sher Shahid
Exploiting XXE via image file upload (Lab #8) [Hindi]
8:29
Exploiting XInclude to retrieve files (Lab #7) [Hindi]
Ali Sher Shahid
Exploiting XInclude to retrieve files (Lab #7) [Hindi]
7:19
Exploiting blind XXE to retrieve data via error (Lab #6) [Hindi]
Ali Sher Shahid
Exploiting blind XXE to retrieve data via error (Lab #6) [Hindi]
7:52
Exploiting blind XXE to exfiltrate data using a malicious external DTD (Lab #5) [Hindi]
Ali Sher Shahid
Exploiting blind XXE to exfiltrate data using a malicious external DTD (Lab #5) [Hindi]
9:25
Blind XXE with out-of-band interaction via XML parameter entities (Lab #4) [Hindi]
Ali Sher Shahid
Blind XXE with out-of-band interaction via XML parameter entities (Lab #4) [Hindi]
5:34
Blind XXE with out of band interaction (Lab #3) [Hindi]
Ali Sher Shahid
Blind XXE with out of band interaction (Lab #3) [Hindi]
5:24
Exploiting XXE to perform SSRF attacks (Lab #2) [Hindi]
Ali Sher Shahid
Exploiting XXE to perform SSRF attacks (Lab #2) [Hindi]
6:44
Exploiting XXE using external entities to retrieve files (Lab #1) [Hindi]
Ali Sher Shahid
Exploiting XXE using external entities to retrieve files (Lab #1) [Hindi]
6:28
Blind OS command injection with out-of-band data exfiltration (Lab #5) Hindi
Ali Sher Shahid
Blind OS command injection with out-of-band data exfiltration (Lab #5) Hindi
7:38
Blind OS command injection with out of band interaction (Lab #4) [Hindi]
Ali Sher Shahid
Blind OS command injection with out of band interaction (Lab #4) [Hindi]
5:37
Blind OS command injection with output redirection (Lab #3) [Hindi]
Ali Sher Shahid
Blind OS command injection with output redirection (Lab #3) [Hindi]
6:49
Blind OS command injection with time delays (Lab #2) [Hindi]
Ali Sher Shahid
Blind OS command injection with time delays (Lab #2) [Hindi]
5:06
OS command injection, simple case (Lab #1) [Hindi]
Ali Sher Shahid
OS command injection, simple case (Lab #1) [Hindi]
6:48
How to install Zui (Brim) on Ubuntu
Ali Sher Shahid
How to install Zui (Brim) on Ubuntu
2:45
SQL injection with filter bypass via XML encoding (Lab #18) [Hindi]
Ali Sher Shahid
SQL injection with filter bypass via XML encoding (Lab #18) [Hindi]
8:09
Blind SQL injection with out-of-band data exfiltration (Lab #17) [Hindi]
Ali Sher Shahid
Blind SQL injection with out-of-band data exfiltration (Lab #17) [Hindi]
8:53
Blind SQL injection with out of band interaction (Lab #16) [Hindi]
Ali Sher Shahid
Blind SQL injection with out of band interaction (Lab #16) [Hindi]
8:29
Blind SQL injection with time delays and information retrieval (Lab #15) [Hindi]
Ali Sher Shahid
Blind SQL injection with time delays and information retrieval (Lab #15) [Hindi]
17:55
Blind SQL injection with time delays (Lab #14) [Hindi]
Ali Sher Shahid
Blind SQL injection with time delays (Lab #14) [Hindi]
8:18
How to install zeek on Kali / Ubuntu with configuration [Hindi]
Ali Sher Shahid
How to install zeek on Kali / Ubuntu with configuration [Hindi]
14:00
Visible error based SQL injection (Lab #13) [Hindi]
Ali Sher Shahid
Visible error based SQL injection (Lab #13) [Hindi]
11:58
Blind SQL injection with conditional errors (Lab #12) [Hindi]
Ali Sher Shahid
Blind SQL injection with conditional errors (Lab #12) [Hindi]
23:44
How to Connect TryHackMe with openvpn and via SSH in Linux [Hindi]
Ali Sher Shahid
How to Connect TryHackMe with openvpn and via SSH in Linux [Hindi]
6:56
Blind SQL injection with conditional responses (Lab #11) [Hindi]
Ali Sher Shahid
Blind SQL injection with conditional responses (Lab #11) [Hindi]
23:52
SQL injection attack, listing the database contents on Oracle (lab #10) [Hindi]
Ali Sher Shahid
SQL injection attack, listing the database contents on Oracle (lab #10) [Hindi]
12:29
SQL injection attack, listing the database contents on non Oracle databases (Lab #9) [Hindi]
Ali Sher Shahid
SQL injection attack, listing the database contents on non Oracle databases (Lab #9) [Hindi]
13:59
SQL injection attack, querying the database type and version on MySQL and Microsoft (Lab #8) [Hindi]
Ali Sher Shahid
SQL injection attack, querying the database type and version on MySQL and Microsoft (Lab #8) [Hindi]
8:08
Learn Ethical Hacking from Beginner to Expert Level 2024 | Web Security Academy
Ali Sher Shahid
Learn Ethical Hacking from Beginner to Expert Level 2024 | Web Security Academy
8:55
SQL injection attack, querying the database type and version on Oracle in Hindi (Lab #7)
Ali Sher Shahid
SQL injection attack, querying the database type and version on Oracle in Hindi (Lab #7)
11:48
SQL injection UNION attack, retrieving multiple values in a single column in Hindi (Lab #6)
Ali Sher Shahid
SQL injection UNION attack, retrieving multiple values in a single column in Hindi (Lab #6)
13:31
SQL injection Union Attack, retrieving data from other tables in Hindi (Lab #5)
Ali Sher Shahid
SQL injection Union Attack, retrieving data from other tables in Hindi (Lab #5)
9:11
SQL injection UNION attack, finding a column containing text in Hindi (Lab #4)
Ali Sher Shahid
SQL injection UNION attack, finding a column containing text in Hindi (Lab #4)
11:56
SQLi UNION attack, determining the number of columns returned by the query in Hindi (Lab #3)
Ali Sher Shahid
SQLi UNION attack, determining the number of columns returned by the query in Hindi (Lab #3)
10:20
SQL injection vulnerability allowing login bypass in Hindi (Lab #2)
Ali Sher Shahid
SQL injection vulnerability allowing login bypass in Hindi (Lab #2)
6:18
SQL injection vulnerability in WHERE clause allowing retrieval of hidden data in Hindi (Lab #1)
Ali Sher Shahid
SQL injection vulnerability in WHERE clause allowing retrieval of hidden data in Hindi (Lab #1)
8:09
Forced OAuth profile linking in Hindi | OAuth Vulnerabilities
Ali Sher Shahid
Forced OAuth profile linking in Hindi | OAuth Vulnerabilities
10:16
Stealing OAuth access tokens via a proxy page in Hindi | OAuth Vulnerabilities
Ali Sher Shahid
Stealing OAuth access tokens via a proxy page in Hindi | OAuth Vulnerabilities
10:03
Stealing OAuth access tokens via an open redirect in Hindi | OAuth Vulnerabilities
Ali Sher Shahid
Stealing OAuth access tokens via an open redirect in Hindi | OAuth Vulnerabilities
16:10
Authentication bypass via OAuth implicit flow in Hindi | OAuth Vulnerabilities
Ali Sher Shahid
Authentication bypass via OAuth implicit flow in Hindi | OAuth Vulnerabilities
5:45