Posts by Author

WebSecNinja: Lesser Known WebAttacks – WSN

WebSecNinja: Lesser Known WebAttacks is a brand new and unique web security course that takes the learner to the next level of web security. A perfect blend of latest and lesser known web attacks that are explained with ultimate details and accompanied by demos and how tos that you can apply in real world red-team […]

Read More Comments Off on WebSecNinja: Lesser Known WebAttacks – WSN

Automated Mobile Application Security Assessment – MAS

Mobile Application market is growing like anything and so is the Mobile Security industry. With lots of frequent application releases and updates happening, conducting the security analysis of mobile applications becomes time consuming mainly because of the overheads in setting up and maintaining a mobile application testing environment. This course will introduce an extendable web […]

Read More Comments Off on Automated Mobile Application Security Assessment – MAS

Cross Site Scripting (XSS) Attacks for Pentesters – XFP

Cross Site Scripting or XSS is still one of the most common injection vulnerability that exist in modern as well as legacy Web Applications. This course will teach XSS in-depth and even talk about the lesserknown derivatives of XSS called Mutation XSS (mXSS) and Relative Path Overwrite XSS (RPO XSS). If you are interested in […]

Read More Comments Off on Cross Site Scripting (XSS) Attacks for Pentesters – XFP

Node.js Security: Pentesting and Exploitation – NJS

Node.js® is a platform built on Chrome’s JavaScript runtime for easily building fast, scalable network applications. Like any platform, Node.js has it’s on set of features that developers blindly use without much thought on security. The heart of Node is JavaScript, so it inherits most of the issues that are found at client side JavaScript. […]

Read More Comments Off on Node.js Security: Pentesting and Exploitation – NJS

Windows Exploit Development Megaprimer – WXP

This is a comprehensive course on Exploit Development in Windows platform. The course is designed in such a way to help the beginners. It will help you understand the different domains of software exploitation. The participants will learn about different types and techniques of exploitation, using debuggers to create their own exploits, understand protection mechanism […]

Read More Comments Off on Windows Exploit Development Megaprimer – WXP