本站已收录 番号和无损神作磁力链接/BT种子 

OWASP Top 10 Web Application Security Risks for ASP.NET

种子简介

种子名称: OWASP Top 10 Web Application Security Risks for ASP.NET
文件类型:
文件数目: 122个文件
文件大小: 2.09 GB
收录时间: 2016-1-18 12:36
已经下载: 3
资源热度: 179
最近下载: 2024-6-18 18:31

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:7576A9AC1ECD4659D8AFEFDF480D37F20B4789D8&dn=OWASP Top 10 Web Application Security Risks for ASP.NET 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

OWASP Top 10 Web Application Security Risks for ASP.NET.torrent
  • Exercide Files.zip360.95MB
  • 3. Cross Site Scripting (XSS)/11 - Demo - ASP NET reequest validation.mp463.64MB
  • 8. Insecure Cryptographic Storage/3 - Demo - Anatomy of an attack.mp460.06MB
  • 5. Insecure Direct Object References/8 - Demo - Building an indirect reference map.mp442.84MB
  • 7. Security Misconfiguration/5 - Demo - Correctly configuring custom errors.mp439.63MB
  • 10. Insufficient Transport Layer Protection/3 - Demo - Anatomy of an attackmp4.mp438.73MB
  • 10. Insufficient Transport Layer Protection/5 - Demo - Understanding secure cookies and froms authentication.mp437.48MB
  • 10. Insufficient Transport Layer Protection/6 - Demo - Securing other cookies in ASP NET.mp436.45MB
  • 2. Injection/3 - Demo - Anatomy of an attack.mp435.42MB
  • 8. Insecure Cryptographic Storage/6 - Understanding salt and brute force attacks.mp434.09MB
  • 6. Cross Site Request Forgery (CSRF)/5 - What make a CSRF attack possible.mp433.22MB
  • 7. Security Misconfiguration/9 - Demo - Using config transforms to apply secure configurations.mp432.6MB
  • 9. Failure to Restrict URL Access/7 - Demo - Role based authorisation with the ASP NET Role Provider.mp429.23MB
  • 10. Insufficient Transport Layer Protection/4 - Risk in practice - Tunisian ISPs.mp428.8MB
  • 7. Security Misconfiguration/8 - Demo - Encrypting sensitive parts of the web-config.mp428.78MB
  • 8. Insecure Cryptographic Storage/7 - Slowing down hashes with new Membership Provider.mp426.52MB
  • 7. Security Misconfiguration/3 - Demo - Anatomy of an attack.mp425.88MB
  • 3. Cross Site Scripting (XSS)/7 - Demo - Implementing output encoding.mp425.56MB
  • 8. Insecure Cryptographic Storage/5 - Understanding password storage and hashing.mp425.1MB
  • 2. Injection/12 - Demo - Injection through stored procedures.mp424.64MB
  • 3. Cross Site Scripting (XSS)/4 - Risk in practice - My Space and Samy.mp424.55MB
  • 8. Insecure Cryptographic Storage/11 - Demo - Symmetric encryption using DPAPI.mp423.49MB
  • 7. Security Misconfiguration/7 - Demo - Keeping frameworks currrent with NuGet.mp422.17MB
  • 10. Insufficient Transport Layer Protection/9 - Demo - Mixed mode HTTPS.mp421.13MB
  • 9. Failure to Restrict URL Access/4 - Risk in practice - Apple AT&T leak.mp421.11MB
  • 9. Failure to Restrict URL Access/6 - Demo - Access controls in ASP NET part 2 - The authorize attribute.mp421.1MB
  • 7. Security Misconfiguration/6 - Demo - Securing web forms tracing.mp420.83MB
  • 5. Insecure Direct Object References/6 - Demo - Implementing access controls.mp420.01MB
  • 9. Failure to Restrict URL Access/5 - Demo - Access controls in ASP NET part 1 - web-config locations.mp419.61MB
  • 2. Injection/10 - Demo - Whitelisting untrusted data.mp419.56MB
  • 10. Insufficient Transport Layer Protection/7 - Demo - Forcing web forms to use HTTPS.mp419.51MB
  • 11. Unvalidated Redirects and Forwards/3 - Demo - Anatomy of an attack.mp418.78MB
  • 6. Cross Site Request Forgery (CSRF)/7 - Demo - Implementing an anti-frogery token in MVC.mp418.47MB
  • 11. Unvalidated Redirects and Forwards/7 - Demo - implementing referrer checking.mp418.42MB
  • 9. Failure to Restrict URL Access/8 - Other access controls risk and misconceptions.mp418.41MB
  • 8. Insecure Cryptographic Storage/4 - Risk in practice - ABC passwords.mp417.99MB
  • 2. Injection/13 - Demo - Injection automation with Havij.mp417.92MB
  • 2. Injection/7 - Demo - The principle of least privilege.mp417.75MB
  • 6. Cross Site Request Forgery (CSRF)/8 - Demo - Web forms approach to anti-frogery tokens.mp417.49MB
  • 3. Cross Site Scripting (XSS)/12 - Demo - Reflective versus persistent XSS.mp417.43MB
  • 6. Cross Site Request Forgery (CSRF)/4 - Risk in practice - Compromised Brazillian modems.mp417.42MB
  • 4. Broken Authentication and Session Management/8 - Demo - Leveraging ASP NET membership provider for authentication.mp417.4MB
  • 7. Security Misconfiguration/4 - Risk in practice - ELMAH.mp417.06MB
  • 11. Unvalidated Redirects and Forwards/6 - Demo - implementing a whitelist.mp416.74MB
  • 3. Cross Site Scripting (XSS)/3 - Demo - Anatomy of an attacker.mp416.73MB
  • 10. Insufficient Transport Layer Protection/12 - Other HTTPS considerations.mp416.68MB
  • 5. Insecure Direct Object References/3 - Demo - Anatomy of an attack.mp416.52MB
  • 10. Insufficient Transport Layer Protection/11 - Other insufficient HTTPS patterns.mp416.38MB
  • 2. Injection/11 - Demo - Entity Framework's SQL parameterisation.mp416.12MB
  • 2. Injection/8 - Demo - Inline SQL parameterisation.mp415.58MB
  • 8. Insecure Cryptographic Storage/8 - Other stronger hashing implemenetations.mp415MB
  • 10. Insufficient Transport Layer Protection/13 - Summary.mp414.94MB
  • 8. Insecure Cryptographic Storage/12 - Whats not cryptographic.mp414.6MB
  • 7. Security Misconfiguration/10 - Demo - Enabling retail mode on the server.mp414.44MB
  • 1. Introduction/3 - Who's doing the hacking.mp414.42MB
  • 6. Cross Site Request Forgery (CSRF)/3 - Demo - Anatomy of an attack.mp414.33MB
  • 1. Introduction/4 - OWASP and the Top 10.mp414.24MB
  • 11. Unvalidated Redirects and Forwards/4 - Risk in practice - US government websites.mp414.05MB
  • 8. Insecure Cryptographic Storage/9 - Things to consider when choosing a hashing implementations.mp414.02MB
  • 3. Cross Site Scripting (XSS)/13 - Demo - Native browser defences.mp413.62MB
  • 10. Insufficient Transport Layer Protection/10 - HTTP strict transport security.mp413.26MB
  • 3. Cross Site Scripting (XSS)/8 - Demo - Output encoding in web forms.mp412.37MB
  • 9. Failure to Restrict URL Access/9 - Summary.mp412.35MB
  • 11. Unvalidated Redirects and Forwards/5 - Understanding the value of unvalidated redirects to attackers.mp412.13MB
  • 8. Insecure Cryptographic Storage/13 - Summary.mp412.03MB
  • 10. Insufficient Transport Layer Protection/8 - Demo - Requiring HTTPS on MVC controllers.mp411.79MB
  • 3. Cross Site Scripting (XSS)/10 - Demo - Whitelisting allowable values.mp411.37MB
  • 8. Insecure Cryptographic Storage/10 - Understanding symmetric and asymmetric encryption.mp410.73MB
  • 5. Insecure Direct Object References/7 - Understanding indirect reference maps.mp410.62MB
  • 5. Insecure Direct Object References/4 - Risk in practice - Citibank.mp410.52MB
  • 5. Insecure Direct Object References/5 - Understanding direct object references.mp410.43MB
  • 3. Cross Site Scripting (XSS)/15 - Summary.mp410.06MB
  • 10. Insufficient Transport Layer Protection/2 - OWASP overview and risk rating.mp410.06MB
  • 2. Injection/9 - Demo - Stored procedure parameterisation.mp410.02MB
  • 4. Broken Authentication and Session Management/7 - Demo - Securely configuring session persistence.mp49.93MB
  • 11. Unvalidated Redirects and Forwards/2 - OWASP overview and risk rating.mp49.84MB
  • 3. Cross Site Scripting (XSS)/6 - Output encoding concepts.mp49.03MB
  • 7. Security Misconfiguration/11 - Summary.mp48.58MB
  • 6. Cross Site Request Forgery (CSRF)/9 - CSRF fallacies and browser defences.mp48.56MB
  • 1. Introduction/5 - Applying security in depth.mp48.15MB
  • 11. Unvalidated Redirects and Forwards/8 - Other issues with the unvalidated redirect riskmp4.mp48.11MB
  • 2. Injection/14 - Summary.mp47.22MB
  • 4. Broken Authentication and Session Management/11 - Other broken authentication patterns.mp46.78MB
  • 1. Introduction/2 - Who's getting hacked.mp46.77MB
  • 6. Cross Site Request Forgery (CSRF)/10 - Summary.mp46.74MB
  • 11. Unvalidated Redirects and Forwards/9 - Summary.mp46.43MB
  • 6. Cross Site Request Forgery (CSRF)/6 - Understanding anti-frogery tokens.mp46.42MB
  • 8. Insecure Cryptographic Storage/2 - OWASP overview and risk rating.mp46.41MB
  • 3. Cross Site Scripting (XSS)/9 - Demo - Output encoding in MVC.mp46.33MB
  • 6. Cross Site Request Forgery (CSRF)/2 - OWASP overview and risk rating.mp46.33MB
  • 4. Broken Authentication and Session Management/4 - Risk in practice - Apples's session fixation.mp46.33MB
  • 7. Security Misconfiguration/2 - OWASP overview and risk rating.mp46.12MB
  • 9. Failure to Restrict URL Access/2 - OWASP overview and risk rating.mp45.97MB
  • 9. Failure to Restrict URL Access/3 - Demo - Anatomy of an attack.mp45.88MB
  • 2. Injection/2 - OWASP overview and risk rating.mp45.87MB
  • 4. Broken Authentication and Session Management/12 - Summary.mp45.71MB
  • 4. Broken Authentication and Session Management/6 - The risk of session persistence in the URL versus cookies.mp45.53MB
  • 4. Broken Authentication and Session Management/10 - Siding versus fixed forms timeout.mp45.35MB
  • 4. Broken Authentication and Session Management/9 - Customising session and forms timeouts to minimise risk windows.mp45.19MB
  • 2. Injection/4 - Risk in practice - LulzSec and Sony.mp44.97MB
  • 2. Injection/6 - Defining untrusted data.mp44.89MB
  • 4. Broken Authentication and Session Management/3 - Demo - Anatomy of an attack.mp44.61MB
  • 5. Insecure Direct Object References/9 - Obfuscation via random surrogate keys.mp44.28MB
  • 3. Cross Site Scripting (XSS)/14 - Demo - Payload obfuscation.mp43.97MB
  • 3. Cross Site Scripting (XSS)/2 - OWASP overview and risk rating.mp43.75MB
  • 10. Insufficient Transport Layer Protection/1 - Introduction.mp43.73MB
  • 5. Insecure Direct Object References/10 - Summary.mp43.66MB
  • 4. Broken Authentication and Session Management/2 - OWASP overview and risk rating.mp43.64MB
  • 5. Insecure Direct Object References/2 - OWASP overview and risk rating.mp43.37MB
  • 2. Injection/1 - Introduction.mp42.99MB
  • 3. Cross Site Scripting (XSS)/1 - Introduction.mp42.79MB
  • 3. Cross Site Scripting (XSS)/5 - Understanding XSS.mp42.68MB
  • 8. Insecure Cryptographic Storage/1 - Introduction.mp42.63MB
  • 7. Security Misconfiguration/1 - Introduction.mp42.24MB
  • 2. Injection/5 - Understanding SQL Injection.mp42.13MB
  • 6. Cross Site Request Forgery (CSRF)/1 - Introduction.mp42.09MB
  • 4. Broken Authentication and Session Management/5 - Persisting state in a stateless protocol.mp42MB
  • 11. Unvalidated Redirects and Forwards/1 - Introduction.mp41.79MB
  • 9. Failure to Restrict URL Access/1 - Introduction.mp41.71MB
  • 4. Broken Authentication and Session Management/1 - Introduction.mp41.52MB
  • 5. Insecure Direct Object References/1 - Introduction.mp41.34MB
  • 1. Introduction/1 - Introduction.mp41.31MB