🔥 Burn Fat Fast. Discover How! 💪

- 3 - 197. Part 21 - Bypassing WAF - 198. Part 22 - Bypass | Ethical Hacking Tutorials

- 3 -


197. Part 21 - Bypassing WAF -


198. Part 22 - Bypassing WAF - Impedance mismatch -



199. Part 23 - Bypassing addslashes - charset mismatch -



NoSQL injection
200. Introduction to NoSQL injection -


201. Introduction to SQL vs NoSQL - Difference between MySQL and MongoDB with tutorial -


202. Abusing NoSQL databases -


203. Making cry - attacking NoSQL for pentesters -


Xpath and XML injection
204. Introduction to Xpath injection -


205. Introduction to XML injection -


206. Practical 1 - bWAPP -


207. Practical 2 - Mutillidae -


208. Practical 3 - webgoat -


209. Hack admin panel using Xpath injection -


210. XXE demo -


211. XXE demo 2 -


212. XXE demo 3 -


LDAP injection
213. Introduction and practical 1 -


214. Practical 2 -


OS command injection
215. OS command injection in bWAPP -


216. bWAAP- OS command injection with Commiux (All levels) -


Local file inclusion
217. Detailed introduction -


218. LFI demo 1 -



219. LFI demo 2 -



Remote file inclusion
220. Detailed introduction -


221. RFI demo 1 -


222. RFI introduction and demo 2 -


HTTP splitting/smuggling
223. Detailed introduction -


224. Demo 1 -


Phase 11 – Generating and testing error codes
225. Generating normal error codes by visiting files that may not exist on the server - for example visit chintan.php or chintan.aspx file on any website
and it may redirect you to 404.php or 404.aspx or their customer error page. Check if an error page is generated by default web server or application
framework or a custom page is displayed which does not display any sensitive information.
226. Use BurpSuite fuzzing techniques to generate stack trace error codes -


Phase 12 – Weak cryptography testing
227. SSL/TLS weak configuration explained -


228. Testing weak SSL/TLS ciphers -


229. Test SSL/TLS security with Qualys guard -


230. Sensitive information sent via unencrypted channels -



Phase 12 – Business logic vulnerability
231. What is a business logic flaw -


232. The Difficulties Finding Business Logic Vulnerabilities with Traditional Security Tools -



233. How To Identify Business Logic Flaws -


234. Business Logic Flaws: Attacker Mindset - https://www.youtube.com