Disclaimer! 16
Warning! 16
Burp Suite. 18
Burpsuite installation on the Pc. 18
Connect Burpsuite in Firefox. 28
Add the Burp Suite in the Chrome. 36
Bypass OTP in Burpsuite. 38
Reduce products price in Burpsuite. 42
Brute Force attack on the DVWA website with the help of Burp Suite. 44
Wireshark. 54
Install Wireshark | Network Protocol Analyzer. 54
Analyzing and Capturing Network Packets. 57
Capturing passwords with Wireshark | Analyzing Packets | Packet Sniffing. 58
Wireshark Network Monitoring. 60
WordPress. 61
Secure WordPress from Hackers. 62
Active WordPress Password limit. 65
WordPress Speed Plugins. 67
WordPress Image Optimization. 69
Create Website for Backlinks and Guest Posting 71
Install Elementor in WordPress. 72
Install Elementor Kit in WordPress. 73
Install Mega Menu in WordPress. 74
Create personal schema markup. 75
Create Contact form in WordPress. 77
App Penetration testing. 79
Api Testing. 79
Find Critical Bug in Mobile App using Yaazhini 83
SEO (Search Engine Optimization) 86
What is Technical SEO?. 86
SEO Chrome Extensions. 88
URL optimization – How to create SEO-friendly URLs 97
Index Website in Duck Duck Go. 98
Index Website in Baidu. 100
If not work try this. 101
Create a Baidu account on Baidu overseas registration page. 103
How to check if you’re indexed in Baidu. 104
Audit website. 105
Add your website in the Ahrefs. 107
Find Low-Competition, High-Traffic Blog Topics (with 5 Free Tools) | Micro Niche. 110
Add website in Google Search Console. 112
Add website in Bing Search Engine. 116
Check website Speed. 117
Google Mobile Friendly Testing Tool 118
AMP Validator. 119
W3C HTML Validator. 120
Add website in Google Analytics. 121
Create Backlink website in WordPress. 131
What are Broken links?. 132
Reasons of broken links?. 132
How to check the broken links?. 132
What is 301 and 302 redirections?. 134
What is a Redirect?. 134
301 – Redirects – Moved Permanently. 134
302 – Redirect. 135
SEO (Search Engine Optimization) 136
How to decrease page load time and improve site? 136
Amazon SEO.. 137
What is Amazon SEO?. 137
SCADA (Supervisory Control and Data Acquisition) 139
What is SCADA?. 139
Major components of the SCADA?. 139
InTouch SCADA. 140
Major Programs: 141
Steganography. 142
What is Steganography?. 142
9/11 Q33N Notepad Trick. 142
Follow the steps: 143
Steganography websites. 145
Automotive Security Testing. 146
Key areas of Automotive security testing. 146
Key areas of Automotive security testing. 147
Methods to find bugs. 148
Static Analysis: 148
Dynamic Analysis: 149
Fuzz Testing: 149
Penetration Testing: 149
Network Security Testing: 150
Hardware Security Testing: 150
Firmware Analysis: 150
Threat Modeling: 151
Security Audits and Compliance Checks: 151
Red Teaming: 151
Subdomain. 152
DNS Enumeration. 152
Find the complete subdomain information’s. 153
Mobile Hacking. 155
How to know your mobile is hacked?. 155
1: Suspicious Account Activity: 155
2: Pop-Up Ads: 155
3: Overheating: 155
4: Strange Texts or Calls: 156
5: Unexpected Apps: 156
6: Slow Performance: 156
7: Unusual Data Usage: 156
8: Battery Drain: 157
PortSwigger Labs. 158
Lab: Insecure direct object references (IDOR) 158
Lab: Excessive trust in client-side controls. 165
Lab: Unprotected admin functionality with unpredictable URL. 174
Lab: OS command injection, simple case. 177
Lab: Basic SSRF against the local server. 182
Lab: Basic SSRF against another back-end system 188
Lab: Stored XSS into HTML context with nothing encoded. 197
Lab: 2FA simple bypass. 201
Lab: Exploiting XXE using external entities to retrieve files. 207
Lab: Exploiting XXE to perform SSRF attacks. 213
Lab: File path traversal, simple case. 218
Second Method Burpsuite: 223
Lab Exploiting cross-site scripting to capture passwords. 224
Bug Bounty. 226
Test for ClickJacking | Bug Bounty Hunting. 226
Bug Bounty Vulnerabilities. 229
The easiest way to find the Redirect Vulnerability, XSS, LFI | Bug Bounty. 230
Open Redirection Bug Vulnerable parameters. 230
Server-Side Request Forgery (SSRF) 233
Impact of SSRF: 233
Types of SSRF Vulnerabilities: 233
Brief overview (Hunting Approach): 233
Blind SSRF Hunting: 234
What is the impact of SSRF attacks?. 235
Reflected XSS. 236
Reflected XXS Practical 237
What is XSS?. 239
Types of XSS. 239
Bug Bounty tips for beginners. 241
1: Find your niche: 241
2: Don’t stop learning: 241
3: Stay consistent: 242
4: Collaborate and join the community: 242
5: Automate the boring tasks (be efficient): 243
6: Go outside your comfort zone: 243
7: Take a break: 244
XML external entity injection (also known as XXE) 245
What is XML external entity injection?. 245
How do XXE vulnerabilities arise?. 245
What are the types of XXE attacks?. 246
Cross-Site Scripting (XSS) Vulnerability Payload List 248
DVWA (Damn Vulnerable Web Application) 260
DVWA Bug Hunting Lab Setup and Configuration 260
Uncaught mysqli_sql_exception: Access denied for user 'dvwa'@'localhost' (using password: YES) 270
Brute Force Lab in DVWA. 273
DVWA File Upload. 280
Cross-Site Scripting (XSS) cookie Session ID Vulnerability: 286
How Session ID is worked. 290
Wi-Fi Hacking. 294
How to hack any Wi-Fi and get passwords with these 9 tricks! 294
Terraform.. 295
Install the Terraform in the Windows. 295
Terraform Commands. 301
Nmap (Network Mapping) 309
Advanced Hacking with Nmap. 309
Docker. 310
What is docker?. 310
Docker is solution: 310
Why you need to Docker: 310
What are Docker Images?. 311
Images Example: 311
What is Container?. 312
Install Docker on windows. 313
Digital Forensics. 316
Digital Forensics Full Roadmap. 316
Cyber Forensic Investigator: 316
Autopsy - Digital Forensics. 319
Nessus. 320
Download the Nessus (vulnerability scanner) 320
Nessus Download Failed. 328
How to find Nessus username and password. 332
Vulnerability Assessment with Nessus. 338
MySQL. 342
How to install MySQL (Server and Workbench) 342
How to Create a MySQL Database with MySQL Workbench. 353
How to create a Table in MySQL. 356
1: What is a database Table?. 356
MySQL Add Data into Tables using the INSERT Query 363
MySQL select query with where clause. 368
MySQL table constraints. 372
MySQL commands And, Or, and Not operator. 376
AND, OR and NOT: 376
MySQL IN operator on Database Table. 380
IN operator: 380
IN operator Syntax: 380
MySQL LIKE operator and Wildcard. 383
MySQL LIKE: 383
Patterns: 383
MySQL Between and NOT Between. 393
Syntax: 393
MySQL Order by and Distinct. 395
Syntax: 395
MySQL aggregate function: SUM, MIN, MAX and AVG 400
AI (Artificial Intelligence) 401
Pakistan first AI Content writing tool | RankNow.ai for ChatGPT extension. 401
Microsoft Azure. 402
How to create VM in Azure portal 402
Website: www.walikhankakar.com
Instagram: https://www.instagram.com/
LinkedIn: https://www.linkedin.com/in/