- Hacking into One Month with Jon and Chris!
- An Overview of the App We Are Hacking
- Legal Disclaimer
- Let's Dive into Proxies with Jon and Chris
- Understanding Ports
- Intro to Proxies
- Intercepting Requests with Burp
- Fun With Encoding
- What is Bruteforcing?
- Guessing Usernames and Passwords
- Harvesting One Month
- Password Attacks
- Fixing Error Message
- Enforcing Strong Passwords
- Preventing Brute Force Attacks
- Trusting Users
- Securing Request Parameters
- Searching For Vulnerabilities
- Finding Hidden Pages
- Automating File and Directory Discovery with Dirbuster
- Enforcing Admin Access
- Let's Discuss "Cross-Site Scripting"
- Javascript Hacks Using Cross-Site Scripting (XSS)
- Hacking Tool - Beef
- Jon and Chris Break Down SQL Injection
- Introduction to Database Queries Using SQL
- Detecting SQL Injection
- Hack Tool - Sqlmap
- Fixing SQL Injection Vulnerabilities
- Storing Secrets
- Keeping Passwords
- Hack Tool - John The Ripper
- Stronger Hashes with Bcrypt
- Protecting Sensitive Information in a Database
- Reviewing Encryption Code
- Applying Encryption
- Masking Sensitive Data
- Exploiting System Commands
- Securing File Operations
- "What the Heck is an API?"
- Accessing Models Using an API
- Securing an API
- Explaining Cross Site Forgery
- Ruin a Vacation Using Cross-Site Request Forgery
- Building a Cross-Site Request Forgery Attack
- Hacking Gmail Using CSRF
- Protecting Against CSRF
- Understanding Mass Assignment
- Privilege Escalation Using Mass Assignment
- Preventing Mass Assignment
- Hacking Github Using Mass Assignment
- Enhancing Mass Assignment with Strong Parameters
- Hacking Download Functionality
- Securing File Downloads
- "Why Do I Have to Update Rails?"
- Maintaining Ruby, Rails, and Gems
- URL Redirection Explained
- Understanding URL Redirection Attacks
- Exploiting URL Redirection
- Fixing URL Redirection Vulnerabilities
- Code Audits with Brakeman
- Hack Tool - Brakeman
- What Can OWASP Do for You?
- Additional Resources - OWASP
- A Rumblr in the Jungle with Jon and Chris
- Rumblr Walkthrough
- Rumblr Hack #1
- Rumblr Hack #2
- Rumblr Hack #3
- Rumblr Hack #4
- Rumblr Hack #5
- Rumblr Hack #6
- Hey Jon, "What's Next?"
- What is a Bug Bounty?
- What's the Day in the Life of a Web Security Hacker?