学习道德黑客和逆向工程
上次更新时间:2024-12-06
课程售价: 2.9 元
联系右侧微信客服充值或购买课程
课程内容
1. [new] Introduction
2. [new] Intro Levels
- 1. Intro 1 (Client code information leak)
- 2. [NEW] Intro 2 (HTML tag information leak)
- 3. Intro 3 (Javascript code information leak)
- 4. Intro 4 (Path traversal vulnerability)
- 5. Intro 5 (Javascript prompt() function information leak)
- 6. [NEW] Intro 6 (Client code modification vulnerability)
- 7. [NEW] Intro 7 (robots.txt data leak vulnerability)
- 8. Intro 8 (Path traversal vulnerability)
- 9. Intro 9 (Client code modification vulnerability)
- 10. Intro 10 (Javascript code exposure and decryption)
- 11. Intro 11 (File redirection vulnerability)
- 12. Intro 12 (MD5 decryption)
3. [new] 24-bit (File extension manipulation exploit)
4. [new] Word of PeacecraftRealistic (Dumpster diving for emails)
5. [new] Secure Agent (Browser Spoofing)
6. [new] Crypt1Crypt (Reverse encryption)
7. [new] Beach (Steganography analyis)
8. [new] Squashed imageStego (Cracking steganography)
9. [new] HTTP MethodIntro (HTTP POST exploit & Bypass CSRF-token protection)
10. [new] Library GatewayRealistic (Javascript code exposure vulnerability)
11. [new] SidIntro (Cookie tampering to bypass login)
12. [new] Crypt2Crypt (Cracking Caeser Cipher encryption)
13. [new] Crypt3Crypt (Decoding Morse Code)
14. [new] SQLi1SQLi (Bypassing login page password using SQL Injection Attack)
15. [new] Recon (Information gathering skills, including B6-Key)
16. [new] Crypt4Crypt (Decrypting ciphertext using online decryptors)
17. [new] Map It (Portscanning and gaining remote access)
18. [new] Crypt5Crypt (Reverse & Decrypt ciphertext using online decryptor)
19. [new] SQLi (Hacking admin username & password using SQL Injection Attack)
20. [new] Princess SlagRealistic (Directory traversal & null byte attacks)
21. [new] Xmas '08Realistic (Website defacement attacks)
22. [new] Planet BidRealistic (Password reminder exploits)
23. [new] Access Logs (Log Injection Attack)
24. [new] Sandra Murphy (XML Injection Attack)
25. [new] AlphabetizeCoding (Using Javascript to defeat countdown timer)
26. [new] AliensStego (Decoding wav files to extract passwords)
27. [new] Custom EncodingCoding (Decryption & hacking website countdown timer)
28. [new] Missile codesForensics (Analyze & extract data from disk images)
29. [new] Captcha1CAPTCHA (Hacking Captcha using OCR and AutoIt)
30. [new] Captcha2CAPTCHA (Hack Captcha with node.js, imagemagick & AutoIt )
31. [new] Captcha3CAPTCHA (Using Python to hack Captcha )
- 1. Introduction to the Captcha3 challenge
- 2. Installing and Using Python
- 3. Installing Pillow library for Python Image Manipulation
- 4. Collecting key images
- 5. Splitting the captcha3 sample using python
- 6. Creating nodejs script to decode captcha sample images
- 7. Using AutoIt to automate tasks and defeat timer limitation
32. Introduction to Software Cracking with crackme's
33. Introduction to x64dbg and Detect it Easy (DIE)
34. Setting up your cracking workspace and workflow
35. Debugger Stepping Basics
36. Stepping Into Calls
37. Breakpoints
38. Reversing Jumps
39. How to patch a program
40. Summary of Cracking Software Workflow
41. Introduction to cracking gui-based programs
42. Analyzing the PE for a gui-based program
43. Crack the Serial Key using BP on strings
44. Windows api functions & the stack
45. Patching to bypass wrong serial key message
46. Bonus Lecture
课程内容
46个章节 , 80个讲座
1. [new] Introduction
2. [new] Intro Levels
- 1. Intro 1 (Client code information leak)
- 2. [NEW] Intro 2 (HTML tag information leak)
- 3. Intro 3 (Javascript code information leak)
- 4. Intro 4 (Path traversal vulnerability)
- 5. Intro 5 (Javascript prompt() function information leak)
- 6. [NEW] Intro 6 (Client code modification vulnerability)
- 7. [NEW] Intro 7 (robots.txt data leak vulnerability)
- 8. Intro 8 (Path traversal vulnerability)
- 9. Intro 9 (Client code modification vulnerability)
- 10. Intro 10 (Javascript code exposure and decryption)
- 11. Intro 11 (File redirection vulnerability)
- 12. Intro 12 (MD5 decryption)
3. [new] 24-bit (File extension manipulation exploit)
4. [new] Word of PeacecraftRealistic (Dumpster diving for emails)
5. [new] Secure Agent (Browser Spoofing)
6. [new] Crypt1Crypt (Reverse encryption)
7. [new] Beach (Steganography analyis)
8. [new] Squashed imageStego (Cracking steganography)
9. [new] HTTP MethodIntro (HTTP POST exploit & Bypass CSRF-token protection)
10. [new] Library GatewayRealistic (Javascript code exposure vulnerability)
11. [new] SidIntro (Cookie tampering to bypass login)
12. [new] Crypt2Crypt (Cracking Caeser Cipher encryption)
13. [new] Crypt3Crypt (Decoding Morse Code)
14. [new] SQLi1SQLi (Bypassing login page password using SQL Injection Attack)
15. [new] Recon (Information gathering skills, including B6-Key)
16. [new] Crypt4Crypt (Decrypting ciphertext using online decryptors)
17. [new] Map It (Portscanning and gaining remote access)
18. [new] Crypt5Crypt (Reverse & Decrypt ciphertext using online decryptor)
19. [new] SQLi (Hacking admin username & password using SQL Injection Attack)
20. [new] Princess SlagRealistic (Directory traversal & null byte attacks)
21. [new] Xmas '08Realistic (Website defacement attacks)
22. [new] Planet BidRealistic (Password reminder exploits)
23. [new] Access Logs (Log Injection Attack)
24. [new] Sandra Murphy (XML Injection Attack)
25. [new] AlphabetizeCoding (Using Javascript to defeat countdown timer)
26. [new] AliensStego (Decoding wav files to extract passwords)
27. [new] Custom EncodingCoding (Decryption & hacking website countdown timer)
28. [new] Missile codesForensics (Analyze & extract data from disk images)
29. [new] Captcha1CAPTCHA (Hacking Captcha using OCR and AutoIt)
30. [new] Captcha2CAPTCHA (Hack Captcha with node.js, imagemagick & AutoIt )
31. [new] Captcha3CAPTCHA (Using Python to hack Captcha )
- 1. Introduction to the Captcha3 challenge
- 2. Installing and Using Python
- 3. Installing Pillow library for Python Image Manipulation
- 4. Collecting key images
- 5. Splitting the captcha3 sample using python
- 6. Creating nodejs script to decode captcha sample images
- 7. Using AutoIt to automate tasks and defeat timer limitation