Rana Khalil
Channel that discusses security related topics. The majority of videos will cover web security but occasionally we'll talk about content related to certs like the OSCP, OSWE and CRTP.
-ABOUT-
Rana Khalil is an accomplished Application Security Engineer currently steering the digital safety ship in Canada's dynamic public and private sectors. With her cutting-edge expertise, she's not only securing applications, but also shaping the future of cybersecurity across the nation.
She holds a Bachelor's and Master’s degree in Computer Science and is OSCP certified. She has spoken about her research at various local and international conferences, and received several awards and honorable mentions for her contributions to the cybersecurity community.
Rana has also founded her own online academy where she teaches web application penetration testing. Her mission? To make cybersecurity education affordable and keep the digital frontier safe, one application at a time.
Business Logic Vulnerabilities - Lab #8 Insufficient workflow validation | Short Version
Business Logic Vulnerabilities - Lab #8 Insufficient workflow validation | Long Version
Business Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Short Version
Уязвимости бизнес-логики — Лабораторная работа №7 Слабая изоляция на конечной точке двойного назн...
Business Logic Vulnerabilities - Lab #6 Inconsistent handling of exceptional input | Short Video
Business Logic Vulnerabilities - Lab #6 Inconsistent handling of exceptional input | Long Video
Business Logic Vulnerabilities - Lab #5 Low Level Logic Flaw | Long Video
Уязвимости бизнес-логики — Лабораторная работа № 5. Ошибка низкоуровневой логики | Короткое видео
Business Logic Vulnerabilities - Lab #4 Flawed enforcement of business rule | Short Version
Business Logic Vulnerabilities - Lab #4 Flawed enforcement of business rule | Long Version
Уязвимости бизнес-логики — Лабораторная работа № 3. Непоследовательные средства контроля безопасн...
Business Logic Vulnerabilities - Lab #3 Inconsistent security controls | Long Version
Уязвимости бизнес-логики — Лабораторная работа №2 Уязвимость высокоуровневой логики | Краткая версия
Business Logic Vulnerabilities - Lab #2 High-level logic vulnerability | Long Version
Уязвимости бизнес-логики — Лабораторная работа №1: Чрезмерное доверие к клиентским элементам упра...
Уязвимости бизнес-логики — Лабораторная работа №1. Чрезмерное доверие к клиентским элементам упра...
Business Logic Vulnerabilities | Complete Guide
SQL Injection - Lab #18 Visible error-based SQL injection | Short Version
SQL Injection - Lab #18 Visible error-based SQL injection | Long Version
Mastering Server-Side Request Forgery Vulnerabilities - The Ultimate Hands-On Course on Udemy!
Authentication Vulnerabilities - Lab #14 2FA bypass using a brute-force attack | Short Version
Authentication Vulnerabilities - Lab #14 2FA bypass using a brute-force attack | Long Version
Authentication Vulnerabilities - Lab #13 Broken brute-force protection | Short Version
Authentication Vulnerabilities - Lab #13 Broken brute-force protection | Long Version
Уязвимости аутентификации — Лабораторная работа № 12. Подбор пароля путём его смены | Краткая версия
Authentication Vulnerabilities - Lab #12 Password brute-force via password change | Long Version
Уязвимости аутентификации — Лабораторная работа № 11. Отравление паролей при сбросе через промежу...
Authentication Vulnerabilities - Lab #11 Password reset poisoning via middleware | Long Version
Mastering Command Injection Vulnerabilities - The Ultimate Hands-On Course on Udemy!
Authentication Vulnerabilities - Lab #10 Offline password cracking | Short Version