Reporting & Vulnerability Disclosure (Day 7 Hacking)
Day 7: Reporting, Fix Suggestions & Vulnerability Disclosure Responsible Hacking: Write a Pentest Report Like…
Password Attacks, OSINT & Social Engineering (Day 6)
Day 6: Password Attacks, OSINT & Social Engineering Tools Cracking & OSINT: Hydra, Crunch, Sherlock…
Exploitation & Injection Attacks Guide (Day 5 Hacking)
Day 5: Exploitation & Injection Attacks Exploiting Websites with SQLMap, XSStrike, and Metasploit Exploitation and…
SQL Injection Testing Guide (Day 4 Ethical Hacking)
Day 4: SQL Injection Testing Extracting Data: SQL Injection with SQLMap & Manual Payloads SQL…
Manual Testing with Burp Suite & OWASP ZAP (Day 3)
Day 3: Manual Testing with Burp Suite & OWASP ZAP Burp Suite and ZAP: Web…
How Black Hat Hackers Make Money Online
The Bottom Line: How Black Hat Hackers Really Make Money Online By ZedX Let’s clear…
Inside the World of Black Hat Hackers & Their Secrets
Inside the World of Black Hat Hackers: Secrets They Don’t Want You to Know By…
Information Gathering & Scanning for Ethical Hacking
Day 2: Information Gathering & Scanning Scanning the Web: Discovering Hidden Paths & Weak Services…