![]() |
|
Burp Web Security Academy - Apprentice Labs Walkthrough - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Burp Web Security Academy - Apprentice Labs Walkthrough (/Thread-Burp-Web-Security-Academy-Apprentice-Labs-Walkthrough--1106522) |
Burp Web Security Academy - Apprentice Labs Walkthrough - AD-TEAM - 09-16-2025 ![]() 2.53 GB | 11min 46s | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English
Files Included :
2 What you will learn.mp4 (6.03 MB) 3 How I set up Burp.mp4 (18.12 MB) 1 SQL injection vulnerability in WHERE clause allowing retrieval of hidden data.mp4 (56.96 MB) 2 SQL injection vulnerability allowing login bypass.mp4 (30.32 MB) 1 Reflected XSS into HTML context with nothing encoded.mp4 (31.46 MB) 2 Stored XSS into HTML context with nothing encoded.mp4 (47.57 MB) 3 DOM XSS in document write sink using source location search.mp4 (35.09 MB) 4 DOM XSS in innerHTML sink using source location search.mp4 (23.64 MB) 5 DOM XSS in jQuery anchor href attribute sink using location search source.mp4 (29.69 MB) 6 DOM XSS in jQuery selector sink using a hashchange event.mp4 (45.21 MB) 7 Reflected XSS into attribute with angle brackets HTML-encoded.mp4 (36.49 MB) 8 Stored XSS into anchor href attribute with double quotes HTML-encoded.mp4 (42.72 MB) 9 Reflected XSS into a JavaScript string with angle brackets HTML encoded.mp4 (34.35 MB) 1 CSRF vulnerability with no defenses.mp4 (42.27 MB) 1 Basic clickjacking with CSRF token protection.mp4 (49.28 MB) 2 Clickjacking with form input data prefilled from a URL parameter.mp4 (40.04 MB) 3 Clickjacking with a frame buster script.mp4 (31.81 MB) 1 CORS vulnerability with basic origin reflection.mp4 (47.32 MB) 2 CORS vulnerability with trusted null origin.mp4 (45.46 MB) 1 Exploiting XXE using external entities to retrieve files.mp4 (32.36 MB) 2 Exploiting XXE to perform SSRF attacks.mp4 (32.51 MB) 1 Basic SSRF against the local server.mp4 (35.47 MB) 2 Basic SSRF against another back-end system.mp4 (32.11 MB) 1 OS command injection, simple case.mp4 (24.44 MB) 1 File path traversal, simple case.mp4 (37.46 MB) 1 Unprotected admin functionality.mp4 (15.13 MB) 2 Unprotected admin functionality with unpredictable URL.mp4 (21.18 MB) 3 User role controlled by request parameter.mp4 (19.77 MB) 4 User role can be modified in user profile.mp4 (25.11 MB) 5 User ID controlled by request parameter.mp4 (25.21 MB) 6 User ID controlled by request parameter, with unpredictable user IDs.mp4 (33.51 MB) 7 User ID controlled by request parameter with data leakage in redirect.mp4 (20.56 MB) 8 User ID controlled by request parameter with password disclosure.mp4 (24.63 MB) 9 Insecure direct object references.mp4 (27.07 MB) 1 Username enumeration via different responses.mp4 (48.12 MB) 2 2FA simple bypass.mp4 (16.98 MB) 3 Password reset broken logic.mp4 (19.84 MB) 1 Manipulating WebSocket messages to exploit vulnerabilities.mp4 (23.6 MB) 1 Modifying serialized objects.mp4 (39.23 MB) 1 Information disclosure in error messages.mp4 (25.38 MB) 2 Information disclosure on debug page.mp4 (28.28 MB) 3 Source code disclosure via backup files.mp4 (23.42 MB) 4 Authentication bypass via information disclosure.mp4 (32.73 MB) 1 Excessive trust in client-side controls.mp4 (25.18 MB) 2 High-level logic vulnerability.mp4 (35.1 MB) 3 Inconsistent security controls.mp4 (16.92 MB) 4 Flawed enforcement of business rules.mp4 (31.73 MB) 1 Basic password reset poisoning.mp4 (36.32 MB) 2 Host header authentication bypass.mp4 (17.07 MB) 1 Authentication bypass via OAuth implicit flow.mp4 (37.11 MB) 1 Remote code execution via web shell upload.mp4 (39.94 MB) 2 Web shell upload via Content-Type restriction bypass.mp4 (35.24 MB) 1 JWT authentication bypass via unverified signature.mp4 (42.41 MB) 2 JWT authentication bypass via flawed signature verification.mp4 (27.89 MB) 1 Accessing private GraphQL posts.mp4 (95.84 MB) 1 Limit overrun race conditions.mp4 (121.84 MB) 1 Detecting NoSQL injection.mp4 (68.77 MB) 2 Exploiting NoSQL operator injection to bypass authentication.mp4 (42.14 MB) 1 Exploiting an API endpoint using documentation.mp4 (48.54 MB) 1 Exploiting LLM APIs with excessive agency.mp4 (65.3 MB) 1 Exploiting path mapping for web cache deception.mp4 (81.49 MB) 1 Mystery Lab 1.mp4 (66.67 MB) 2 Mystery Lab 2.mp4 (53.57 MB) 3 Mystery Lab 3.mp4 (30.03 MB) 4 Mystery Lab 4.mp4 (53.17 MB) 5 Mystery Lab 5.mp4 (61.7 MB) 6 Mystery Lab 6.mp4 (35.72 MB) 7 Mystery Lab 7.mp4 (60.09 MB)] Screenshot ![]()
RapidGator
NitroFlare DDownload |