• Lesson 1: Introduction to Web-application Penetration-Testing
  • Lesson 2: Finding Subdomains
  • Lesson 3: Understanding HTTP
  • Lesson 4: Access Control Flaws
  • Lesson 5: Ajax Security
  • Lesson 6: Authentication Flaws
  • Lesson 7: Buffer Overflows
  • Lesson 8: Code Quality
  • Lesson 9: Concurrency Flaws
  • Lesson 10: Cross-Site Scripting
  • Lesson 11: Improper Error Handling
  • Lesson 12: Injection Flaws
  • Lesson 13: Denial of Service
  • Lesson 14: Insecure Communication
  • Lesson 15: Insecure Configuration
  • Lesson 16: Insecure Storage
  • Lesson 17: Malicious File Execution
  • Lesson 18: Parameter Tampering
  • Lesson 19: Challenge Online Platform