Join the Offensive Security Front-Line Gain access to exclusive, members-only video content by joining our Patreon community Learn More

We started our Patreon Page to inspire more people evolve, develop and enhance their hacking skills, always from an ethical perspective. The Content is recommended for moderate to experienced people that have knowledge in using the Kali Linux OS, and understanding about the hacking methodologies.

By becoming a Patron (Member),

You will find exclusive new content available ONLY on Patreon every month, showing you continuous techniques and methodologies in Offensive Security.

Expect to learn about hacking tools covering several aspects such as OSINT, Brute-Forcing & Fuzzing Attacks, Content Discovery, Web Application Testing, Post-Exploitation, Attacks, and Recon, covering tools from Kali Linux and GitHub.

You will also get access to Exclusive Mini series of Episodes about various scenarios covering Hacking/Red Teaming that require more hours, such as how to hack from the Top 10 OWASP Vulnerabilities, with more focus on top tools but with chained attacks, and a more in-depth explanation of the topic that we will be covering.

What we aim is to help you think outside the box by expanding your creativity as a hacker from a Red Teaming Mindset. You will constantly discover new topics covering such wide topics in the Offensive Security World.

You will unlock: Over 70 episodes and Over 30 hours worth of Content.

Overcoming Security Measures: Path Traversal filter bypass, OAuth, and 2FA for Red Teams

This full episode is a free sample of our Exclusive Premium content on Patreon, giving you a glimpse of what you’ll learn when you join. In this episode, we’ll focus on manual attacks with a focus on Path Traversal. You’ll learn how to manipulate variables with “dot-dot-slash” sequences to access files and directories outside of the web root folder. We’ll also cover bypassing an OAuth service that allows users to log in with social media accounts, and explore techniques for bypassing 2FA measures when they are in place. This Episode demonstrates that even if you implement 2FA measures which is a great step toward security, it is only as ever secure as its implementation.

Choose Membership Click below to view the Membership options

Maltego Series

Episodes:

The Recon-ng Framework: Rapid and Customized Reconnaissance for Red Teams

Episodes:

Mastering Reconnaissance: Bug Bounty Techniques using Amass

Episodes:

How Hackers get past EDRs, AVs, and Endpoint Defenses Series

Episodes:

Unleashing the Power of One-Liners Series

Episodes:

Exploitation from the Top 10 OWASP Vulnerabilities Series

Episodes:

Perform advanced Fuzzing Techniques Series

Episodes:

OSINT Techniques Series

Episodes:

Nmap/Masscan Series

Episodes:

Wireshark Series

Episodes:

Burp Suite Series

Episodes:

Metasploit Series

Episodes:

  • Installation, Configuration & Setup (EP. 1)
  • Scanning & Exploiting using NMAP (EP. 2)
  • Exploiting, Shell to Meterpreter & Persistency – (EP. 3)
  • Exploiting the FireFox Browser (EP. 4)
  • Finding SQL Injection using built in SQLMAP & Metasploit (EP. 5)
  • Perform a WebApp Vulnerability Scan using WMAP on Metasploitable 2 (EP. 6)
  • How Hackers perform advanced Post Exploitation techniques (EP. 7)
  • The Power of Privilege Escalation with Mimikatz using Pass the Hash & Advanced Techniques (EP. 8)
  • Using Searchsploit to install new exploits into Metasploit manually (EP. 9)
  • Creating your own Vulnerability Scanner and Backdoors using Metasploit’s Own Scripting Engine (EP. 10)

 

  • How to Create a Meterpreter Session compromising an Android Phone using Metasploit & BeEF
  • Using BeEF with The Social Engineering Toolkit
  • BeEF Framework: Understanding The Attack Modules & Demo
  • So do AVs work? Demo of How Hackers bypass Latest AVs using Advanced Techniques
  • Kali Linux & The Raspberry Pi 4 – Sniffing HTTPS Traffic & Creating FUD Backdoors
  • Burp Suite: Intercepting Requests & Modifying Responses
  • Zenmap The GUI of NMAP, DDoS Tool by BHEH

Choose Membership Click below to view the Membership options