Rana Khalil
Channel that discusses security related topics. The majority of videos will cover web security but occasionally we'll talk about content related to certs like the OSCP, OSWE and CRTP.
-ABOUT-
Rana Khalil is an accomplished Application Security Engineer currently steering the digital safety ship in Canada's dynamic public and private sectors. With her cutting-edge expertise, she's not only securing applications, but also shaping the future of cybersecurity across the nation.
She holds a Bachelor's and Master’s degree in Computer Science and is OSCP certified. She has spoken about her research at various local and international conferences, and received several awards and honorable mentions for her contributions to the cybersecurity community.
Rana has also founded her own online academy where she teaches web application penetration testing. Her mission? To make cybersecurity education affordable and keep the digital frontier safe, one application at a time.

Business Logic Vulnerabilities - Lab #8 Insufficient workflow validation | Short Version

Business Logic Vulnerabilities - Lab #8 Insufficient workflow validation | Long Version

Business Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Short Version

Business Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Long Version

Business Logic Vulnerabilities - Lab #6 Inconsistent handling of exceptional input | Short Video

Business Logic Vulnerabilities - Lab #6 Inconsistent handling of exceptional input | Long Video

Business Logic Vulnerabilities - Lab #5 Low Level Logic Flaw | Long Video

Business Logic Vulnerabilities - Lab #5 Low Level Logic Flaw | Short Video

Business Logic Vulnerabilities - Lab #4 Flawed enforcement of business rule | Short Version

Business Logic Vulnerabilities - Lab #4 Flawed enforcement of business rule | Long Version

Business Logic Vulnerabilities - Lab #3 Inconsistent security controls | Short Version

Business Logic Vulnerabilities - Lab #3 Inconsistent security controls | Long Version

Business Logic Vulnerabilities - Lab #2 High-level logic vulnerability | Short Version

Business Logic Vulnerabilities - Lab #2 High-level logic vulnerability | Long Version

Business Logic Vulnerabilities - Lab #1 Excessive trust in client-side controls | Short Version

Business Logic Vulnerabilities - Lab #1 Excessive trust in client-side controls | Long Version

Business Logic Vulnerabilities | Complete Guide

SQL Injection - Lab #18 Visible error-based SQL injection | Short Version

SQL Injection - Lab #18 Visible error-based SQL injection | Long Version

Mastering Server-Side Request Forgery Vulnerabilities - The Ultimate Hands-On Course on Udemy!

Authentication Vulnerabilities - Lab #14 2FA bypass using a brute-force attack | Short Version

Authentication Vulnerabilities - Lab #14 2FA bypass using a brute-force attack | Long Version

Authentication Vulnerabilities - Lab #13 Broken brute-force protection | Short Version

Authentication Vulnerabilities - Lab #13 Broken brute-force protection | Long Version

Authentication Vulnerabilities - Lab #12 Password brute-force via password change | Short Version

Authentication Vulnerabilities - Lab #12 Password brute-force via password change | Long Version

Authentication Vulnerabilities - Lab #11 Password reset poisoning via middleware | Short Version

Authentication Vulnerabilities - Lab #11 Password reset poisoning via middleware | Long Version

Mastering Command Injection Vulnerabilities - The Ultimate Hands-On Course on Udemy!

Authentication Vulnerabilities - Lab #10 Offline password cracking | Short Version