Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 1.Gathering Information Using Whois Lookup (4:41)
- 2.Discovering Technologies Used On The Website (6:03)
- 3.Gathering Comprehensive DNS Information (5:57)
- 4.Discovering Websites On The Same Server (3:43)
- 5.Discovering Subdomains (5:05)
- 6.Discovering Sensitive Files (7:25)
- 7.Analysing Discovered Files (7:25)
- 8.Maltego - Discovering Servers_Domains_Files (7:42)
- 9.Maltego - Discovering Websites_ Hosting Provider _ Emails (4:49)
- 1.What are they And How To Discover _ Exploit Basic File Upload Vulnerabilities (6:43)
- 2.HTTP Requests - GET_POST (4:13)
- 3.Intercepting HTTP Requests (6:44)
- 4.Exploiting Advanced File Upload Vulnerabilities (4:37)
- 5.Exploiting More Advanced File Upload Vulnerabilities (4:22)
- 6.Security Fixing File Upload Vulnerabilities (6:21)
- 1.Discovering_Exploiting Blind SQL Injections (5:53)
- 2.Discovering a More Complicated SQL Injection (7:21)
- 3.Extracting Data _passwords_ By Exploiting a More Difficult SQL Injection (4:47)
- 4.Bypassing Filters (4:48)
- 5.Quick Fix To Prevent SQL Injections (6:43)
- 6. Reading_Writing Files On The Server Using SQL Injection Vulnerability (5:57)
- 7.Getting A Reverse Shell Access _Gaining Full Control Over The Target Web Server (8:26)
- 8.Discovering SQL Injections _ Extracting Data Using SQLmap (6:47)
- 9.Getting a Direct SQL Shell using SQLmap (2:57)
- 10.The Right Way To Prevent SQL Injection (4:58)
- 1.Hooking Victims To BeEF Using Reflected XSS (5:41)
- 2.Hooking Victims To BeEF Using Stored XSS (4:09)
- 3.BeEF - Interacting With Hooked Victims (4:09)
- 4.BeEF - Running Basic Commands On Victims (4:24)
- 5.BeEF - Stealing Credentials_Passwords Using A Fake Login Prompt (2:17)
- 6.Bonus - Installing Veil 3.1 (6:20)
- 7.Bonus - Veil Overview _Payloads Basics (7:20)
- 8.Bonus - Generating An Undetectable Backdoor Using Veil 3 (9:44)
- 9.Bonus - Listening For Incoming Connections (7:18)
- 10.Bonus - Using A Basic Delivery Method To Test The Backdoor_Hack Windows 10 (7:12)
- 11.BeEF - Gaining Full Control Over Windows Target (3:39)
- 12.Fixing XSS Vulnerabilities (7:17)
- 1.Logging In As Admin Without a Password By Manipulating Cookies (6:05)
- 2.Discovering Cross Site Request Forgery Vulnerabilities_CSRF (6:46)
- 3.Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File (7:00)
- 4.Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (5:40)
- 5.The Right Way To Prevent CSRF Vulnerabilities (5:40)
- 1.Post Exploitation Introduction (3:58)
- 2.Interacting With The Reverse Shell Access Obtained In Previous Lectures (6:59)
- 3.Escalating Reverse Shell Access To Weevely Shell (7:52)
- 4.Weevely Basics - Accessing Other Websites_Running Shell Commands (6:32)
- 5.Bypassing Limited Privileges _ Executing Shell Commands (4:53)
- 6.Downloading Files From Target Webserver (4:39)
- 7.Uploading Files To Target Webserver (7:52)
- 8.Getting a Reverse Connection From Weevely (7:46)
- 9.Accessing The Database (8:53)
- 10.Discovering Basic Reflected XSS (3:46)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.