Rana Khalil
74K subscribers
5:55
Business Logic Vulnerabilities - Lab #8 Insufficient workflow validation | Short Version
Rana Khalil
680 views • 3 weeks ago
21:32
Business Logic Vulnerabilities - Lab #8 Insufficient workflow validation | Long Version
Rana Khalil
475 views • 3 weeks ago
5:12
Business Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Short Version
Rana Khalil
507 views • 4 weeks ago
23:59
Business Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Long Version
Rana Khalil
352 views • 4 weeks ago
15:02
Business Logic Vulnerabilities - Lab #6 Inconsistent handling of exceptional input | Short Video
Rana Khalil
523 views • 1 month ago
16:47
Business Logic Vulnerabilities - Lab #6 Inconsistent handling of exceptional input | Long Video
Rana Khalil
417 views • 1 month ago
15:37
Business Logic Vulnerabilities - Lab #5 Low Level Logic Flaw | Long Video
Rana Khalil
633 views • 1 month ago
13:55
Business Logic Vulnerabilities - Lab #5 Low Level Logic Flaw | Short Video
Rana Khalil
481 views • 1 month ago
8:16
Business Logic Vulnerabilities - Lab #4 Flawed enforcement of business rule | Short Version
Rana Khalil
591 views • 1 month ago
30:36
Business Logic Vulnerabilities - Lab #4 Flawed enforcement of business rule | Long Version
Rana Khalil
519 views • 1 month ago
6:19
Business Logic Vulnerabilities - Lab #3 Inconsistent security controls | Short Version
Rana Khalil
678 views • 1 month ago
8:02
Business Logic Vulnerabilities - Lab #3 Inconsistent security controls | Long Version
Rana Khalil
453 views • 1 month ago
6:48
Business Logic Vulnerabilities - Lab #2 High-level logic vulnerability | Short Version
Rana Khalil
809 views • 2 months ago
27:23
Business Logic Vulnerabilities - Lab #2 High-level logic vulnerability | Long Version
Rana Khalil
617 views • 2 months ago
5:51
Business Logic Vulnerabilities - Lab #1 Excessive trust in client-side controls | Short Version
Rana Khalil
1.3K views • 2 months ago
26:08
Business Logic Vulnerabilities - Lab #1 Excessive trust in client-side controls | Long Version
Rana Khalil
994 views • 2 months ago
18:58
Business Logic Vulnerabilities | Complete Guide
Rana Khalil
3.5K views • 2 months ago
14:34
SQL Injection - Lab #18 Visible error-based SQL injection | Short Version
Rana Khalil
1.1K views • 2 months ago
16:13
SQL Injection - Lab #18 Visible error-based SQL injection | Long Version
Rana Khalil
1.6K views • 2 months ago
9:02
Mastering Server-Side Request Forgery Vulnerabilities - The Ultimate Hands-On Course on Udemy!
Rana Khalil
2.8K views • 3 months ago
9:39
Authentication Vulnerabilities - Lab #14 2FA bypass using a brute-force attack | Short Version
Rana Khalil
1.7K views • 3 months ago
11:21
Authentication Vulnerabilities - Lab #14 2FA bypass using a brute-force attack | Long Version
Rana Khalil
1K views • 3 months ago
9:10
Authentication Vulnerabilities - Lab #13 Broken brute-force protection | Short Version
Rana Khalil
1K views • 3 months ago
18:14
Authentication Vulnerabilities - Lab #13 Broken brute-force protection | Long Version
Rana Khalil
992 views • 3 months ago
10:52
Authentication Vulnerabilities - Lab #12 Password brute-force via password change | Short Version
Rana Khalil
493 views • 6 months ago
26:36
Authentication Vulnerabilities - Lab #12 Password brute-force via password change | Long Version
Rana Khalil
480 views • 6 months ago
8:14
Authentication Vulnerabilities - Lab #11 Password reset poisoning via middleware | Short Version
Rana Khalil
2.9K views • 6 months ago
9:55
Authentication Vulnerabilities - Lab #11 Password reset poisoning via middleware | Long Version
Rana Khalil
1.7K views • 6 months ago
8:28
Mastering Command Injection Vulnerabilities - The Ultimate Hands-On Course on Udemy!
Rana Khalil
3.3K views • 7 months ago
11:46
Authentication Vulnerabilities - Lab #10 Offline password cracking | Short Version
Rana Khalil
2K views • 7 months ago
Load More