▒█████ █████▒ █████▒ ██████ ▓█████ ▄████▄ ██▒ █▓ ▄▄▄ █ ██ ██▓ ▄▄▄█████▓ ▒██▒ ██▒▓██ ▒▓██ ▒▒██ ▒ ▓█ ▀ ▒██▀ ▀█▓██░ █▒▒████▄ ██ ▓██▒▓██▒ ▓ ██▒ ▓▒ ▒██░ ██▒▒████ ░▒████ ░░ ▓██▄ ▒███ ▒▓█ ▄▓██ █▒░▒██ ▀█▄ ▓██ ▒██░▒██░ ▒ ▓██░ ▒░ ▒██ ██░░▓█▒ ░░▓█▒ ░ ▒ ██▒▒▓█ ▄ ▒▓▓▄ ▄██▒▒██ █░░░██▄▄▄▄██ ▓▓█ ░██░▒██░ ░ ▓██▓ ░ ░ ████▓▒░░▒█░ ░▒█░ ▒██████▒▒░▒████▒▒ ▓███▀ ░ ▒▀█░ ▓█ ▓██▒▒▒█████▓ ░██████▒▒██▒ ░ ░ ▒░▒░▒░ ▒ ░ ▒ ░ ▒ ▒▓▒ ▒ ░░░ ▒░ ░░ ░▒ ▒ ░ ░ ▐░ ▒▒ ▓▒█░░▒▓▒ ▒ ▒ ░ ▒░▓ ░▒ ░░ ░ ▒ ▒░ ░ ░ ░ ░▒ ░ ░ ░ ░ ░ ░ ▒ ░ ░░ ▒ ▒▒ ░░░▒░ ░ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░░ ░ ▒ ░░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░ ░
OFFENSIVE | DEFENSIVE | CTF | TOOLS | ABOUT

eWPT | Web Penetration Tester
01. Penetration Testing Process Penetration Testing Process - NOTES PDF Content
02. Introduction Introduction - NOTES PDF Content
03. Information Gathering Information Gathering - NOTES PDF Content
04. Cross Site Scripting Cross Site Scripting - NOTES PDF Content
05. SQL Injections SQL Injection - NOTES PDF Content
06. Authorization and Authentication Authentication and Authorization - NOTES PDF Content
07. Session Security Session Security - NOTES PDF Content
08. Flash Flash - NOTES PDF Content
09. HTML , HTML - NOTES PDF Content
10. File and Resources Attacks File and Resources Attacks - NOTES PDF Content
11. Other Attacks Other Attacks - NOTES PDF Content
12. Web Services Web Services - NOTES PDF Content
13. XPATH XPATH - NOTES PDF Content
14. Penetration Testing CMS Penetration Testing CMS - NOTES PDF Content
15. Penetration Testing NoSQL Databases Penetration Testing NoSQL Databases - NOTES PDF Content
Videos 1. HTTP Cookies and Sessions 2. Same Origin Policy 3. Burp Suite 4. OWASP Zap 5. Web Application Information Gathering 6. Subdomain Enumeration 7. Web Application Fingerprint 8. Crawling and Spidering 9. Dirbuster 10 .XSS Reflected and Persistant 11. XSS DOM 12. BEEF 13. SQL Injection Basics 14. SQLMap Basics 15. Finding SQL Injections 16. Exploiting In-Band SQL Injections 17. Exploiting Error-Based SQL Injection 18. Exploiting Blind SQL Injections 19. Username Enumeration 20. Bypass Authorization 21. Session Hijacking and Fixation 22. Cross-Site Request Forgery 23. Flash Security and Attacks 24. HTML5 CORS 25. File and Resources Attacks 26. Clickjacking 27. Web Services SOAP 28. XPATH and XCAT 29. Capturing WordPress Credentials for Lateral Movement 30. Exploiting a Vulnerability in WordPress Core