Skip to navigation
Skip to navigation
Skip to search form
Skip to login form
Skip to footer
Skip to main content
MVP189
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
PAREPOS
JAVABET99
KONTAN88
PEWE128
LAGA88
SKY99IDN
BUANA88
BOXING55
DEWISRI88
DEWISRI88
DEWISRI88
MVP189
slot mania
MVP189
situs tergacor
pg slot wallet
Accessibility options
Accessibility profiles
Visual impairment
Seizure and epileptic
Color vision deficiency
ADHD
Learning
Content adjustments
Readable font
Highlight titles
Highlight links
Stop animations
Text size
+
+ +
+ + +
Line height
+
+ +
+ + +
Text spacing
+
+ +
+ + +
Color adjustments
Dark contrast
Light contrast
High contrast
High saturation
Low saturation
Monochrome
Orientation adjustments
Reading guide
Reading Mask
Big black cursor
Big white cursor
Email: it@huph.edu.vn
Email: it@huph.edu.vn
Các khóa học
Link list
Đổi giao diện
Giao diện cũ
Giao diện mới
Learning AI
Machine Learning cơ bản
en
English
Technology
Security
Complete Web Application Offensive Hacking CoursePro Hacker
0 students
Last updated
Dec 2024
Enrol now
Overview
Course content
Instructors
About the course
Show more...
Course content
Sections:
1
•
Activities:
1
•
Resources:
63
Expand all
Section 1
Contents
Announcements
001 Course Introduction Overview WAGc gitir
002 Promo nZOn gitir
003 Lab Architecture mVRb gitir
004 Install Run Vulnerable Web Applications Software kCGu gitir
005 Ethical Hacking to4f gitir
006 How Web Servers and Application Works lwWy gitir
007 Balanced Information System Triangle MR0r gitir
009 Get Growing cL0x gitir
010 Methodology ahOO gitir
011 Hunting tools wRvX gitir
012 Bug Bounty Hunting Platforms 8Z02 gitir
013 Bug Bounty RCE Wun4 gitir
015 Cyber Threat Intelligence rapX gitir
016 Cyber Knowledge Graph l8xr gitir
017 Dynamic file inclusion vulnerability tNxL gitir
018 Path traversal vulnerability UzLV gitir
019 Dynamic Remote File Inclusion 4o3x gitir
020 Impact of File Inclusion Vulnerability IcIl gitir
021 Lab Exercise Attack Techniques Exploitation T2eS gitir
022 File Inclusion Vulnerabilities Defensive Techniques RPrm gitir
023 Hack Dangerous File Uploads qCwa gitir
024 Detection of Insecure File Upload Vulnerability 82oR gitir
025 Impact of file upload vulnerability Xo30 gitir
026 Lab Exercise Attack Techniques Exploitation Vtlc gitir
027 File Upload Vulnerability Attacks Defensive Techniques NISf gitir
029 Unauthenticated Server Side Forgery Attacks 9n22 gitir
030 Detection of Server Side Request Forgery Attack paHx gitir
031 Large Attack surface to exploit SSRF ok5R gitir
032 Server Side Request Forgery Attack Types 3JWS gitir
033 SSRF Attack Impact dmq9 gitir
034 Lab Exercise Attack Techniques Exploitation icuU gitir
035 SSRF Attacks Defensive Techniques and Tools 2JgQ gitir
036 Server Side Template Injection Vulnerability VOZJ gitir
037 SSTI Vulnerability Customization Features Impact MA9x gitir
038 Server Side Template Injection Vulnerability Detection Identification sY11 gitir
039 Lab Exercise Attack Techniques Exploitation CbWC gitir
040 SSTI Vulnerability Attacks Defensive Techniques Tools OJ89 gitir
041 Introduction to SQL 5Ek7 gitir
042 SQL Injection Vulnerability Ikf7 gitir
043 Different Types of SQL Injection Attacks ql7s gitir
044 SQL Injection Vulnerability Impact 3ejk gitir
045 Lab Exercise SQLi Attack Techniques Exploitation K3lG gitir
046 SQL Injection Attacks Defensive Techniques Additional Tools AiED gitir
050 Command Injection Attack tsjq gitir
051 Impact of Command Injection Attack ZR98 gitir
052 Lab Exercise CMDI Attack techniques exploitations CGdR gitir
053 Command Injection Attacks Defensive Techniques 5lrx gitir
054 Object Injection Attack m67M gitir
055 Lab Exercise ObjI Attack techniques exploitations ke6M gitir
056 Object Injection Attacks Defensive Techniques pUVu gitir
057 XSS Attacks 8h83 gitir
058 Different Attack Types of XSS eEPY gitir
059 Impact of XSS Attacks 3FDJ gitir
060 XSS vulnerability attacks Detection and Exploitation ahZT gitir
061 Lab Exercise XSS Attack techniques exploitations wpcW gitir
062 XSS Attacks Defensive Techniques Evmp gitir
066 Insecure Direct Object Reference Attack uaKL gitir
067 Lab Exercise Insecure Direct Object Injection Attack techniques exploitations lhFA gitir
068 Insecure Direct Object Injection Attacks Defensive Techniques Hiax gitir
070 Insecure Deserialization Attacks cnOa gitir
071 Detection of Insecure Deserialization Vulnerabilities 4NMW gitir
072 Insecure Deserialization Attacks Defensive Techniques EUFB gitir
073 Lab Exercise Attack Techniques Exploitation LK5e gitir
Instructors
Enrolment options
Complete Web Application Offensive Hacking CoursePro Hacker
Course modified date:
28 Dec 2024
Enrolled students:
There are no students enrolled in this course.
Guests cannot access this course. Please log in.
Continue
Enrol now
This course includes
Forums
Resources
Share this course
Scroll to top
×
Close
×
Close