01-Introduction-to-Local-and-Remote-File-Inclusion-(LFI-RFI)-(1-37-)
02-Local-File-Inclusion-Attacks-(4-20-)
03-Remote-File-Inclusion-Attacks-(7-38-)
04-File-Inclusion-Challenge-Walkthrough-(4-28-)
05-Introduction-to-SQL-Injection-(4-03-)
06-Basic-SQL-Injection-Attacks-(9-38-)
07-Blind-SQL-Injection-Attacks---Part-1-(9-52-)
08-Blind-SQL-Injection-Attacks---Part-2-(12-53-)
09-SQL-Injection-Challenge-Walkthrough-(5-36-)
10-Second-Order-SQL-Injection-(2-59-)
11-Introduction-to-Cross-Site-Scripting-(XSS)-(4-50-)
12-Basic-Cross-Site-Scripting-(XSS)-Attacks-(3-15-)
13-Stored-Cross-Site-Scripting-(XSS)-Attacks-(7-38-)
14-Cross-Site-Scripting-(XSS)-Challenge-Walkthrough-(3-24-)
15-Introduction-to-Command-Injection-(2-24-)
16-Command-Injection-Attacks-(4-57-)
17-Blind-Command-Injection-(3-57-)
18-Command-Injection-Challenge-Walkthrough-(4-04-)
19-Introduction-to-Server-Side-Template-Injection-(SSTI)-(1-08-)
20-Exploiting-Server-Side-Template-Injection-(SSTI)-(5-14-)
21-Server-Side-Template-Injection-(SSTI)-Challenge-Walkthrough-(3-31-)
22-XML-External-Entity-(XXE)-Injection-(5-55-)
23-Introduction-to-Insecure-File-Uploads-(0-31-)
24-Insecure-File-Upload-Client-Side-Controls-Bypass-(8-48-)
25-Insecure-File-Upload-Bypasses-(9-13-)
26-Insecure-File-Uploads-Challenge-Walkthrough-(3-29-)