Kakar Security Edition 2

· Wali Khan Kakar
4.9
8 reviews
Ebook
1000
Pages
Eligible
Ratings and reviews aren’t verified  Learn More

About this ebook

Contents

Disclaimer! 16

Warning! 16

Burp Suite. 18

Burpsuite installation on the Pc. 18

Connect Burpsuite in Firefox. 28

Add the Burp Suite in the Chrome. 36

Bypass OTP in Burpsuite. 38

Reduce products price in Burpsuite. 42

Brute Force attack on the DVWA website with the help of Burp Suite. 44

Wireshark. 54

Install Wireshark | Network Protocol Analyzer. 54

Analyzing and Capturing Network Packets. 57

Capturing passwords with Wireshark | Analyzing Packets | Packet Sniffing. 58

Wireshark Network Monitoring. 60

WordPress. 61

Secure WordPress from Hackers. 62

Active WordPress Password limit. 65

WordPress Speed Plugins. 67

WordPress Image Optimization. 69

Create Website for Backlinks and Guest Posting 71

Install Elementor in WordPress. 72

Install Elementor Kit in WordPress. 73

Install Mega Menu in WordPress. 74

Create personal schema markup. 75

Create Contact form in WordPress. 77

App Penetration testing. 79

Api Testing. 79

Find Critical Bug in Mobile App using Yaazhini 83

SEO (Search Engine Optimization) 86

What is Technical SEO?. 86

SEO Chrome Extensions. 88

URL optimization – How to create SEO-friendly URLs 97

Index Website in Duck Duck Go. 98

Index Website in Baidu. 100

If not work try this. 101

Create a Baidu account on Baidu overseas registration page. 103

How to check if you’re indexed in Baidu. 104

Audit website. 105

Add your website in the Ahrefs. 107

Find Low-Competition, High-Traffic Blog Topics (with 5 Free Tools) | Micro Niche. 110

Add website in Google Search Console. 112

Add website in Bing Search Engine. 116

Check website Speed. 117

Google Mobile Friendly Testing Tool 118

AMP Validator. 119

W3C HTML Validator. 120

Add website in Google Analytics. 121

Create Backlink website in WordPress. 131

What are Broken links?. 132

Reasons of broken links?. 132

How to check the broken links?. 132

What is 301 and 302 redirections?. 134

What is a Redirect?. 134

301 – Redirects – Moved Permanently. 134

302 – Redirect. 135

SEO (Search Engine Optimization) 136

How to decrease page load time and improve site? 136

Amazon SEO.. 137

What is Amazon SEO?. 137

SCADA (Supervisory Control and Data Acquisition) 139

What is SCADA?. 139

Major components of the SCADA?. 139

InTouch SCADA. 140

Major Programs: 141

Steganography. 142

What is Steganography?. 142

9/11 Q33N Notepad Trick. 142

Follow the steps: 143

Steganography websites. 145

Automotive Security Testing. 146

Key areas of Automotive security testing. 146

Key areas of Automotive security testing. 147

Methods to find bugs. 148

Static Analysis: 148

Dynamic Analysis: 149

Fuzz Testing: 149

Penetration Testing: 149

Network Security Testing: 150

Hardware Security Testing: 150

Firmware Analysis: 150

Threat Modeling: 151

Security Audits and Compliance Checks: 151

Red Teaming: 151

Subdomain. 152

DNS Enumeration. 152

Find the complete subdomain information’s. 153

Mobile Hacking. 155

How to know your mobile is hacked?. 155

1: Suspicious Account Activity: 155

2: Pop-Up Ads: 155

3: Overheating: 155

4: Strange Texts or Calls: 156

5: Unexpected Apps: 156

6: Slow Performance: 156

7: Unusual Data Usage: 156

8: Battery Drain: 157

PortSwigger Labs. 158

Lab: Insecure direct object references (IDOR) 158

Lab: Excessive trust in client-side controls. 165

Lab: Unprotected admin functionality with unpredictable URL. 174

Lab: OS command injection, simple case. 177

Lab: Basic SSRF against the local server. 182

Lab: Basic SSRF against another back-end system   188

Lab: Stored XSS into HTML context with nothing encoded. 197

Lab: 2FA simple bypass. 201

Lab: Exploiting XXE using external entities to retrieve files. 207

Lab: Exploiting XXE to perform SSRF attacks. 213

Lab: File path traversal, simple case. 218

Second Method Burpsuite: 223

Lab Exploiting cross-site scripting to capture passwords. 224

Bug Bounty. 226

Test for ClickJacking | Bug Bounty Hunting. 226

Bug Bounty Vulnerabilities. 229

The easiest way to find the Redirect Vulnerability, XSS, LFI | Bug Bounty. 230

Open Redirection Bug Vulnerable parameters. 230

Server-Side Request Forgery (SSRF) 233

Impact of SSRF: 233

Types of SSRF Vulnerabilities: 233

Brief overview (Hunting Approach): 233

Blind SSRF Hunting: 234

What is the impact of SSRF attacks?. 235

Reflected XSS. 236

Reflected XXS Practical 237

What is XSS?. 239

Types of XSS. 239

Bug Bounty tips for beginners. 241

1: Find your niche: 241

2: Don’t stop learning: 241

3: Stay consistent: 242

4: Collaborate and join the community: 242

5: Automate the boring tasks (be efficient): 243

6: Go outside your comfort zone: 243

7: Take a break: 244

XML external entity injection (also known as XXE) 245

What is XML external entity injection?. 245

How do XXE vulnerabilities arise?. 245

What are the types of XXE attacks?. 246

Cross-Site Scripting (XSS) Vulnerability Payload List 248

DVWA (Damn Vulnerable Web Application) 260

DVWA Bug Hunting Lab Setup and Configuration 260

Uncaught mysqli_sql_exception: Access denied for user 'dvwa'@'localhost' (using password: YES) 270

Brute Force Lab in DVWA. 273

DVWA File Upload. 280

Cross-Site Scripting (XSS) cookie Session ID Vulnerability: 286

How Session ID is worked. 290

Wi-Fi Hacking. 294

How to hack any Wi-Fi and get passwords with these 9 tricks! 294

Terraform.. 295

Install the Terraform in the Windows. 295

Terraform Commands. 301

Nmap (Network Mapping) 309

Advanced Hacking with Nmap. 309

Docker. 310

What is docker?. 310

Docker is solution: 310

Why you need to Docker: 310

What are Docker Images?. 311

Images Example: 311

What is Container?. 312

Install Docker on windows. 313

Digital Forensics. 316

Digital Forensics Full Roadmap. 316

Cyber Forensic Investigator: 316

Autopsy - Digital Forensics. 319

Nessus. 320

Download the Nessus (vulnerability scanner) 320

Nessus Download Failed. 328

How to find Nessus username and password. 332

Vulnerability Assessment with Nessus. 338

MySQL. 342

How to install MySQL (Server and Workbench) 342

How to Create a MySQL Database with MySQL Workbench. 353

How to create a Table in MySQL. 356

1: What is a database Table?. 356

MySQL Add Data into Tables using the INSERT Query 363

MySQL select query with where clause. 368

MySQL table constraints. 372

MySQL commands And, Or, and Not operator. 376

AND, OR and NOT: 376

MySQL IN operator on Database Table. 380

IN operator: 380

IN operator Syntax: 380

MySQL LIKE operator and Wildcard. 383

MySQL LIKE: 383

Patterns: 383

MySQL Between and NOT Between. 393

Syntax: 393

MySQL Order by and Distinct. 395

Syntax: 395

MySQL aggregate function: SUM, MIN, MAX and AVG  400

AI (Artificial Intelligence) 401

Pakistan first AI Content writing tool | RankNow.ai for ChatGPT extension. 401

Microsoft Azure. 402

How to create VM in Azure portal 402


Ratings and reviews

4.9
8 reviews
Sangeeta Rajput
May 17, 2025
ayush darpan is promoting a free trick or treat you right away and Narendra Modi for prime video download free music for prime video is not
Did you find this helpful?
A Google user
March 6, 2025
Good 👍
Did you find this helpful?
Kim Cuanico
February 20, 2025
Kimcuanico
Did you find this helpful?

About the author

Website: www.walikhankakar.com

Instagram: https://www.instagram.com/walikhankakaro/

LinkedIn: https://www.linkedin.com/in/wali-khan-kakar-40515b260/

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.