Exploiting file upload vulnerabilities to execute arbitrary code.
SQL Injection for MySQL databases.
Exploiting XML parsers.
Identifying web content to launch further attacks.
Injecting malicious code into web applications.
Encoding Shellcode for use within malware.
A review of the CBBH course and exam.
Hiding IAT entries to evade detection.
Ways of gaining access to WPA-PSK networks.
Getting started with Cobalt Strike.
Exploiting LFI vulnerabilities in web applications.
Decoding Flask signed session cookies.