Cat Pea University
6
Home
Lectures
List
Links
Tiles
Audiobook
Alerts
The Penetration Tester
Sunday • April 30th 2023 • 2:07:59 pm
The Penetration Tester
Sunday • April 30th 2023 • 2:07:59 pm
4 Most Difficult IT Security Certifications
DevSecOps : What, Why and How
"I rob banks for a living," but it's all totally legal🎙Darknet Diaries Ep. 66: Freakyclown
Who Stole the NSA's Top Secret Hacking Tools?🎙Darknet Diaries Ep. 53: Shadow Brokers
This Hacker Makes $160K a Day — After He Got Out of Federal Prison🎙Darknet Diaries Ep. 60: dawgyg
D3FC0N
James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling
BiC Village - Ochuan Marshall - The Last Log4J Talk You Ever Need
Jacob Baines - Do Not Trust the ASA, Trojans
Melvin Langvik - Taking a Dump In The Cloud
Black Hat
Keynote - Our Kryptonite: A Defendable Internet
Confidence in Chaos: Strategies for World-Class Security Operations
Real-World Detection Evasion Techniques in the Cloud
{JS-ON: Security-OFF}: Abusing JSON-Based SQL Queries
Keynote - Cybersecurity: The Next Generation
NullCon
Panel Session | Elements Of A Successful Security Strategy: A Comprehensive Approach
The Silent Spy Among Us: Modern Attacks Against Smart Intercoms by Vera Mens | Nullcon Berlin 2023
Keynote | Server Side Prototype Pollution: Blackbox Detection Without The DoS by Gareth Heyes
Raining CVEs On WordPress Plugins With Semgrep by Shreya Pohekar & Sheeraz Ali | Nullcon Goa 2022
Scale Hacking To Secure Your Cloud And Beyond by Anand Prakash | Nullcon Goa 2022
Introduction
What Is Ethical Hacking? | Ethical Hacking In 8 Minutes | Ethical Hacking Explanation | Simplilearn
Ethical Hacking In 2 Minutes | What Is Ethical Hacking? | Ethical Hacking Explained | Simplilearn
What is an Ethical Hacker and What Do They Do?
Overview
Introduction to Hacking | How to Start Hacking
How To Become A Hacker In 2023 | Step By Step Guide For Beginners (Neat tool listing)
OWASP Web Application Penetration Testing
Full Course
Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019)
Ethical Hacking 101: Web App Penetration Testing - a full course for beginners
Session Hijacking
Cookie Stealing - Computerphile
Difference between cookies, session and tokens
Session Hijacking Attack | Session ID and Cookie Stealing | SideJacking
Ethical Hacking - What is Session Hijacking
Ethical Hacking Course: Module 11 - Session Hijacking Theory
Ethical Hacking: Module 11, Session Hijacking Lab Session
How Hackers Hijack Your Cookies? Use HttpOnly!
Web App Pentesting - HTTP Cookies & Sessions
Certifications
Top 7 Highest Paid Cyber Security Certifications: Highest Paid Certifications in Cyber Security 2022
Certified Ethical Hacker (CEH)
Free CEH v12 10 Hours Complete Course(Part-1)
Free CEH v12 10 Hours Complete Course (Part-2)
CompTIA PenTest+
CompTIA PenTest+ Full Course - FREE (11 Hours) PT0-002
CompTIA Pentesting+ Part 1
CompTIA PenTesting + Part 2
CompTIA PenTesting + Part 3
CompTIA PenTesting + Part 4
CompTIA PENTEST+ PART 5
CompTIA PenTesting+ Part 6
CompTIA Pen Testing + Vulnerability Scan Analysis Part 7
CompTIA PenTesting + Password Cracking part 8
CompTIA Pen Testing + Penetration testing wired Network Part 9
CompTIA PenTesting Attacking Wireless Networks Part 10
CompTIA Pen Testing +Linux Exploits part 11
CompTIA Pen testing + Windows Exploits Part 12
CompTIA Pen testing + Mobile Devices Part 13
CompTIA Pen testing + Mobile Devices Part 14
CompTIA PenTesting+ Application Testing Part 15
GIAC Penetration Tester (GPEN)
GIAC Penetration Tester GPEN Practice Questions
Offensive Security Certified Professional (OSCP)
OffSec Live | Walkthrough of a PEN-200 AD Set
Practice
Full Tutorial on HackTheBox Setup (Cybersecurity Like a Pro)
TryHackMe Getting Started Tutorial
HTS
HackThisSite Basic Challenge 1
HackThisSite Basic Challenge 2
HackThisSite Basic Challenge 3
HackThisSite Basic Challenge 4
HackThisSite Basic Challenge 5
HackThisSite Basic Challenge 6
HackThisSite Basic Challenge 7
HackThisSite Basic Mission 8
HackThisSite Basic Mission 9
HackThisSite Basic Mission 10
HackThisSite Basic Mission 11
Goat Juice
Hacking the OWASP WebGoat - by Omar Santos
Hacking the OWASP Juice Shop Part 1 - by Omar Santos
Hacking the OWASP Juice Shop Part 2 - by Omar Santos
Pentesting OWASP Juice Shop - Part 1
Pentesting OWASP Juice Shop - Part 2
Pentesting OWASP Juice Shop - Part 3
Pentesting OWASP Juice Shop - Part 4
Pentesting OWASP Juice Shop - Part 5
Finale
Scammers Who Scam Scammers, Hackers Who Hack Hackers: Exploring a Sub-economy on Cybercrime Forums
How to Build a Product that Scales into a Company
Harvard CS50 – Full Computer Science University Course (24 hours)
DEF CON 30 - Winn Schwartau - My First Hack Was in 1958
Links
4 Most Difficult IT Security Certifications
(www.youtube.com)
https://www.youtube.com/watch?v=cWlVxMu2AJM
DevSecOps : What, Why and How
(www.youtube.com)
https://www.youtube.com/watch?v=DzX9Vi_UQ8o&t=55
"I rob banks for a living," but it's all totally legal🎙Darknet Diaries Ep. 66: Freakyclown
(www.youtube.com)
https://www.youtube.com/watch?v=HDy_sYYw5PE
Who Stole the NSA's Top Secret Hacking Tools?🎙Darknet Diaries Ep. 53: Shadow Brokers
(www.youtube.com)
https://www.youtube.com/watch?v=Zje2Pqmh-I0
This Hacker Makes $160K a Day — After He Got Out of Federal Prison🎙Darknet Diaries Ep. 60: dawgyg
(www.youtube.com)
https://www.youtube.com/watch?v=nDgUsOS7kpE
James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling
(www.youtube.com)
https://www.youtube.com/watch?v=B8KW8KPVcUo
BiC Village - Ochuan Marshall - The Last Log4J Talk You Ever Need
(www.youtube.com)
https://www.youtube.com/watch?v=qGDpBCEKvlQ
Jacob Baines - Do Not Trust the ASA, Trojans
(www.youtube.com)
https://www.youtube.com/watch?v=NlcTJAWTSLc
Melvin Langvik - Taking a Dump In The Cloud
(www.youtube.com)
https://www.youtube.com/watch?v=27fv-maYVm0
Keynote - Our Kryptonite: A Defendable Internet
(www.youtube.com)
https://www.youtube.com/watch?v=VRmrn1zO2GM
Confidence in Chaos: Strategies for World-Class Security Operations
(www.youtube.com)
https://www.youtube.com/watch?v=D17-yJg3ML0
Real-World Detection Evasion Techniques in the Cloud
(www.youtube.com)
https://www.youtube.com/watch?v=sSLUjr3PQmM
{JS-ON: Security-OFF}: Abusing JSON-Based SQL Queries
(www.youtube.com)
https://www.youtube.com/watch?v=V-VZ5WbR8uE
Keynote - Cybersecurity: The Next Generation
(www.youtube.com)
https://www.youtube.com/watch?v=uPM_IgTdHCk
Panel Session | Elements Of A Successful Security Strategy: A Comprehensive Approach
(www.youtube.com)
https://www.youtube.com/watch?v=UHe3dtLV1_U
The Silent Spy Among Us: Modern Attacks Against Smart Intercoms by Vera Mens | Nullcon Berlin 2023
(www.youtube.com)
https://www.youtube.com/watch?v=YttsyG5295o
Keynote | Server Side Prototype Pollution: Blackbox Detection Without The DoS by Gareth Heyes
(www.youtube.com)
https://www.youtube.com/watch?v=LD-KcuKM_0M
Raining CVEs On WordPress Plugins With Semgrep by Shreya Pohekar & Sheeraz Ali | Nullcon Goa 2022
(www.youtube.com)
https://www.youtube.com/watch?v=RvKLn2ofMAo
Scale Hacking To Secure Your Cloud And Beyond by Anand Prakash | Nullcon Goa 2022
(www.youtube.com)
https://www.youtube.com/watch?v=QIJ82hoZRWU
What Is Ethical Hacking? | Ethical Hacking In 8 Minutes | Ethical Hacking Explanation | Simplilearn
(www.youtube.com)
https://www.youtube.com/watch?v=XLvPpirlmEs
Ethical Hacking In 2 Minutes | What Is Ethical Hacking? | Ethical Hacking Explained | Simplilearn
(www.youtube.com)
https://www.youtube.com/watch?v=OTf3kMhCtg4
What is an Ethical Hacker and What Do They Do?
(www.youtube.com)
https://www.youtube.com/watch?v=KZ93C-CroAA
Introduction to Hacking | How to Start Hacking
(www.youtube.com)
https://www.youtube.com/watch?v=SkfxL_We8ro
How To Become A Hacker In 2023 | Step By Step Guide For Beginners (Neat tool listing)
(www.youtube.com)
https://www.youtube.com/watch?v=W6vcd2gJw3Q
OWASP Web Application Penetration Testing
(www.youtube.com)
https://www.youtube.com/watch?v=Xglj_KgIIOY
Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019)
(www.youtube.com)
https://www.youtube.com/watch?v=3Kq1MIfTWCE
Ethical Hacking 101: Web App Penetration Testing - a full course for beginners
(www.youtube.com)
https://www.youtube.com/watch?v=2_lswM1S264
Cookie Stealing - Computerphile
(www.youtube.com)
https://www.youtube.com/watch?v=T1QEs3mdJoc
Difference between cookies, session and tokens
(www.youtube.com)
https://www.youtube.com/watch?v=GhrvZ5nUWNg
Session Hijacking Attack | Session ID and Cookie Stealing | SideJacking
(www.youtube.com)
https://www.youtube.com/watch?v=oI7dX6DWyTo
Ethical Hacking - What is Session Hijacking
(www.youtube.com)
https://www.youtube.com/watch?v=sqMCPxwzIf8
Ethical Hacking Course: Module 11 - Session Hijacking Theory
(www.youtube.com)
https://www.youtube.com/watch?v=Q4NJ39os7mo
Ethical Hacking: Module 11, Session Hijacking Lab Session
(www.youtube.com)
https://www.youtube.com/watch?v=JmiUyPCkZ2Y
How Hackers Hijack Your Cookies? Use HttpOnly!
(www.youtube.com)
https://www.youtube.com/watch?v=WX4BHSm9uPI
Web App Pentesting - HTTP Cookies & Sessions
(www.youtube.com)
https://www.youtube.com/watch?v=zHBpJA5XfDk
Top 7 Highest Paid Cyber Security Certifications: Highest Paid Certifications in Cyber Security 2022
(www.youtube.com)
https://www.youtube.com/watch?v=Nsh2LrYKV8A
Free CEH v12 10 Hours Complete Course(Part-1)
(www.youtube.com)
https://www.youtube.com/watch?v=Xtf_Nn4UX4k
Free CEH v12 10 Hours Complete Course (Part-2)
(www.youtube.com)
https://www.youtube.com/watch?v=fytwTFrk_dc
CompTIA PenTest+ Full Course - FREE (11 Hours) PT0-002
(www.youtube.com)
https://www.youtube.com/watch?v=WczBlBjoQeI
CompTIA Pentesting+ Part 1
(www.youtube.com)
https://www.youtube.com/watch?v=-nZ34OzPVGU&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=1&pp=iAQB
CompTIA PenTesting + Part 2
(www.youtube.com)
https://www.youtube.com/watch?v=j1D3aIQEX_4&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=2&pp=iAQB
CompTIA PenTesting + Part 3
(www.youtube.com)
https://www.youtube.com/watch?v=MBF1Z0SbuwE&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=3&pp=iAQB
CompTIA PenTesting + Part 4
(www.youtube.com)
https://www.youtube.com/watch?v=sCevV3PaEt8&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=4&pp=iAQB
CompTIA PENTEST+ PART 5
(www.youtube.com)
https://www.youtube.com/watch?v=eR5FEQt1rzA&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=5&pp=iAQB
CompTIA PenTesting+ Part 6
(www.youtube.com)
https://www.youtube.com/watch?v=WkdDgKeF5oE&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=6&pp=iAQB
CompTIA Pen Testing + Vulnerability Scan Analysis Part 7
(www.youtube.com)
https://www.youtube.com/watch?v=HS-W1AOqSuo&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=7&pp=iAQB
CompTIA PenTesting + Password Cracking part 8
(www.youtube.com)
https://www.youtube.com/watch?v=T0N6vUL4_9Q&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=8&pp=iAQB
CompTIA Pen Testing + Penetration testing wired Network Part 9
(www.youtube.com)
https://www.youtube.com/watch?v=ih37Ec98l9c&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=9&pp=iAQB
CompTIA PenTesting Attacking Wireless Networks Part 10
(www.youtube.com)
https://www.youtube.com/watch?v=7aJv81sLda8&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=10&pp=iAQB
CompTIA Pen Testing +Linux Exploits part 11
(www.youtube.com)
https://www.youtube.com/watch?v=5w-TG4jTPsQ&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=11&pp=iAQB
CompTIA Pen testing + Windows Exploits Part 12
(www.youtube.com)
https://www.youtube.com/watch?v=T70IEDSxChY&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=12&pp=iAQB
CompTIA Pen testing + Mobile Devices Part 13
(www.youtube.com)
https://www.youtube.com/watch?v=0m8DX0aN1Vg&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=13&pp=iAQB
CompTIA Pen testing + Mobile Devices Part 14
(www.youtube.com)
https://www.youtube.com/watch?v=5Hy0imcF_Kk&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=14&pp=iAQB
CompTIA PenTesting+ Application Testing Part 15
(www.youtube.com)
https://www.youtube.com/watch?v=hPsoB_U285w&list=PL9QW_Id8-jnxQF7SXgOYzA3CK8aL4oX2f&index=15&pp=iAQB
GIAC Penetration Tester GPEN Practice Questions
(www.youtube.com)
https://www.youtube.com/watch?v=wCkO2FJEUOM&t=20
OffSec Live | Walkthrough of a PEN-200 AD Set
(www.youtube.com)
https://www.youtube.com/watch?v=2NLi4wzAvTw&t=551
Full Tutorial on HackTheBox Setup (Cybersecurity Like a Pro)
(www.youtube.com)
https://www.youtube.com/watch?v=QPNdOok2t3A
TryHackMe Getting Started Tutorial
(www.youtube.com)
https://www.youtube.com/watch?v=ROO2pDPgja4
HackThisSite Basic Challenge 1
(www.youtube.com)
https://www.youtube.com/watch?v=MhI8zi6reYw&list=PLjrF25Df7idwsxy0Oex2nSOcqHHWaFcW9&index=1&pp=iAQB
HackThisSite Basic Challenge 2
(www.youtube.com)
https://www.youtube.com/watch?v=mTxKco_0bgA&list=PLjrF25Df7idwsxy0Oex2nSOcqHHWaFcW9&index=2&pp=iAQB
HackThisSite Basic Challenge 3
(www.youtube.com)
https://www.youtube.com/watch?v=1zsapFhH0Uo&list=PLjrF25Df7idwsxy0Oex2nSOcqHHWaFcW9&index=3&pp=iAQB
HackThisSite Basic Challenge 4
(www.youtube.com)
https://www.youtube.com/watch?v=QPPhutf0FWA&list=PLjrF25Df7idwsxy0Oex2nSOcqHHWaFcW9&index=4&pp=iAQB
HackThisSite Basic Challenge 5
(www.youtube.com)
https://www.youtube.com/watch?v=NKaMfBV3caA&list=PLjrF25Df7idwsxy0Oex2nSOcqHHWaFcW9&index=5&pp=iAQB
HackThisSite Basic Challenge 6
(www.youtube.com)
https://www.youtube.com/watch?v=t506xILCFIc&list=PLjrF25Df7idwsxy0Oex2nSOcqHHWaFcW9&index=6&pp=iAQB
HackThisSite Basic Challenge 7
(www.youtube.com)
https://www.youtube.com/watch?v=vWf2CuLOrOM&list=PLjrF25Df7idwsxy0Oex2nSOcqHHWaFcW9&index=7&pp=iAQB
HackThisSite Basic Mission 8
(www.youtube.com)
https://www.youtube.com/watch?v=Pl9m3AqvrZc&list=PLjrF25Df7idwsxy0Oex2nSOcqHHWaFcW9&index=8&pp=iAQB
HackThisSite Basic Mission 9
(www.youtube.com)
https://www.youtube.com/watch?v=BCzYtsNsosg&list=PLjrF25Df7idwsxy0Oex2nSOcqHHWaFcW9&index=9&pp=iAQB
HackThisSite Basic Mission 10
(www.youtube.com)
https://www.youtube.com/watch?v=35Uzjw2H8Uw&list=PLjrF25Df7idwsxy0Oex2nSOcqHHWaFcW9&index=10&pp=iAQB
HackThisSite Basic Mission 11
(www.youtube.com)
https://www.youtube.com/watch?v=XTMq1TggJaM&list=PLjrF25Df7idwsxy0Oex2nSOcqHHWaFcW9&index=11&pp=iAQB
Hacking the OWASP WebGoat - by Omar Santos
(www.youtube.com)
https://www.youtube.com/watch?v=cUqyPHtqvJA
Hacking the OWASP Juice Shop Part 1 - by Omar Santos
(www.youtube.com)
https://www.youtube.com/watch?v=w2lGZ7ESO84
Hacking the OWASP Juice Shop Part 2 - by Omar Santos
(www.youtube.com)
https://www.youtube.com/watch?v=-nVCzf4sZd8
Pentesting OWASP Juice Shop - Part 1
(www.youtube.com)
https://www.youtube.com/watch?v=Cz37iejTsH4
Pentesting OWASP Juice Shop - Part 2
(www.youtube.com)
https://www.youtube.com/watch?v=523l4Pzhimc
Pentesting OWASP Juice Shop - Part 3
(www.youtube.com)
https://www.youtube.com/watch?v=F8iRF2d-YzE
Pentesting OWASP Juice Shop - Part 4
(www.youtube.com)
https://www.youtube.com/watch?v=1hhd9EwX7h0
Pentesting OWASP Juice Shop - Part 5
(www.youtube.com)
https://www.youtube.com/watch?v=lGVAXCfFwv0
Scammers Who Scam Scammers, Hackers Who Hack Hackers: Exploring a Sub-economy on Cybercrime Forums
(www.youtube.com)
https://www.youtube.com/watch?v=5bNQnNdZeb0
How to Build a Product that Scales into a Company
(www.youtube.com)
https://www.youtube.com/watch?v=r-98YRAF1dY
Harvard CS50 – Full Computer Science University Course (24 hours)
(www.youtube.com)
https://www.youtube.com/watch?v=8mAITcNt710
DEF CON 30 - Winn Schwartau - My First Hack Was in 1958
(www.youtube.com)
https://www.youtube.com/watch?v=kibTTcIRXHg
Artwork Credit
https://catpea.com