本站已收录 番号和无损神作磁力链接/BT种子 

Hack Yourself First - How to go on the Cyber-Offense

种子简介

种子名称: Hack Yourself First - How to go on the Cyber-Offense
文件类型: 视频
文件数目: 80个文件
文件大小: 1 GB
收录时间: 2016-11-27 05:03
已经下载: 3
资源热度: 172
最近下载: 2024-11-21 11:25

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:a4a6ec2c63c0f8463a40d0dd3046af977cdbb96d&dn=Hack Yourself First - How to go on the Cyber-Offense 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Hack Yourself First - How to go on the Cyber-Offense.torrent
  • 01.Introduction/01.About the course.wmv3.25MB
  • 01.Introduction/02.Why hack yourself first.wmv7.17MB
  • 01.Introduction/03.Introducing a vulnerable website – Supercar Showdown.wmv13.94MB
  • 01.Introduction/04.Using Chrome's developer tools.wmv12.69MB
  • 01.Introduction/05.Monitoring and composing requests with Fiddler.wmv8.36MB
  • 01.Introduction/06.Modifying requests and responses in Fiddler.wmv8.75MB
  • 02.Transport Layer Protection/01.Introduction.wmv2.27MB
  • 02.Transport Layer Protection/02.The three objectives of transport layer protection.wmv4.18MB
  • 02.Transport Layer Protection/03.Understanding a man in the middle attack.wmv6.29MB
  • 02.Transport Layer Protection/04.Protecting sensitive data in transit.wmv11.88MB
  • 02.Transport Layer Protection/05.The risk of sending cookies over insecure connections.wmv26.91MB
  • 02.Transport Layer Protection/06.How loading login forms over HTTP is risky.wmv43.06MB
  • 02.Transport Layer Protection/07.Exploiting mixed-mode content.wmv20.54MB
  • 02.Transport Layer Protection/08.The HSTS header.wmv15.21MB
  • 02.Transport Layer Protection/09.Summary.wmv4.56MB
  • 03.Cross Site Scripting (XSS)/01.Introduction.wmv2.57MB
  • 03.Cross Site Scripting (XSS)/02.Understanding untrusted data and sanitisation.wmv9.79MB
  • 03.Cross Site Scripting (XSS)/03.Establishing input sanitisation practices.wmv7.85MB
  • 03.Cross Site Scripting (XSS)/04.Understanding XSS and output encoding.wmv15.08MB
  • 03.Cross Site Scripting (XSS)/05.Identifying the use of output encoding.wmv9.27MB
  • 03.Cross Site Scripting (XSS)/06.Delivering a payload via reflected XSS.wmv14.78MB
  • 03.Cross Site Scripting (XSS)/07.Testing for the risk of persistent XSS.wmv22.85MB
  • 03.Cross Site Scripting (XSS)/08.The X-XSS-Protection header.wmv16.54MB
  • 03.Cross Site Scripting (XSS)/09.Summary.wmv4.91MB
  • 04.Cookies/01.Introduction.wmv1.75MB
  • 04.Cookies/02.Cookies 101.wmv10.21MB
  • 04.Cookies/03.Understanding HttpOnly cookies.wmv19.31MB
  • 04.Cookies/04.Understanding secure cookies.wmv16.83MB
  • 04.Cookies/05.Restricting cookie access by path.wmv23.11MB
  • 04.Cookies/06.Reducing risk with cookie expiration.wmv12.35MB
  • 04.Cookies/07.Using session cookies to further reduce risk.wmv8.86MB
  • 04.Cookies/08.Summary.wmv4.1MB
  • 05.Internal Implementation Disclosure/01.Introduction.wmv2.98MB
  • 05.Internal Implementation Disclosure/02.How an attacker builds a website risk profile.wmv15.67MB
  • 05.Internal Implementation Disclosure/03.Server response header disclosure.wmv11.68MB
  • 05.Internal Implementation Disclosure/04.Locating at-risk websites.wmv19.84MB
  • 05.Internal Implementation Disclosure/05.HTTP fingerprinting of servers.wmv14.07MB
  • 05.Internal Implementation Disclosure/06.Disclosure via robots.txt.wmv7.43MB
  • 05.Internal Implementation Disclosure/07.The risks in HTML source.wmv7.54MB
  • 05.Internal Implementation Disclosure/08.Internal error message leakage.wmv17.98MB
  • 05.Internal Implementation Disclosure/09.Lack of access controls on diagnostic data.wmv19.92MB
  • 05.Internal Implementation Disclosure/10.Summary.wmv6.21MB
  • 06.Parameter Tampering/01.Introduction.wmv3.21MB
  • 06.Parameter Tampering/02.Identifying untrusted data in HTTP request parameters.wmv17.95MB
  • 06.Parameter Tampering/03.Capturing requests and manipulating parameters.wmv19.94MB
  • 06.Parameter Tampering/04.Manipulating application logic via parameters.wmv14.69MB
  • 06.Parameter Tampering/05.Testing for missing server side validation.wmv31.58MB
  • 06.Parameter Tampering/06.Understanding model binding.wmv5.03MB
  • 06.Parameter Tampering/07.Executing a mass assignment attack.wmv16.3MB
  • 06.Parameter Tampering/08.HTTP verb tampering.wmv20.47MB
  • 06.Parameter Tampering/09.Fuzz testing.wmv28.12MB
  • 06.Parameter Tampering/10.Summary.wmv8.15MB
  • 07.SQL Injection/01.Outline.wmv2.91MB
  • 07.SQL Injection/02.Understanding SQL injection.wmv14.2MB
  • 07.SQL Injection/03.Testing for injection risks.wmv13.95MB
  • 07.SQL Injection/04.Discovering database structure via injection.wmv22.83MB
  • 07.SQL Injection/05.Harvesting data via injection.wmv8.25MB
  • 07.SQL Injection/06.Automating attacks with Havij.wmv12.97MB
  • 07.SQL Injection/07.Blind SQL injection.wmv26.47MB
  • 07.SQL Injection/08.Secure app patterns.wmv13.15MB
  • 07.SQL Injection/09.Summary.wmv8.62MB
  • 08.Cross Site Attacks/01.Introduction.wmv2.24MB
  • 08.Cross Site Attacks/02.Understanding cross site attacks.wmv7.73MB
  • 08.Cross Site Attacks/03.Testing for a cross site request forgery risk.wmv14.22MB
  • 08.Cross Site Attacks/04.The role of anti-forgery tokens.wmv21.68MB
  • 08.Cross Site Attacks/05.Testing cross site request forgery against APIs.wmv26.01MB
  • 08.Cross Site Attacks/06.Mounting a clickjacking attack.wmv29.53MB
  • 08.Cross Site Attacks/07.Summary.wmv5.67MB
  • 09.Account Management/01.Introduction.wmv3.6MB
  • 09.Account Management/02.Understanding password strength and attack vectors.wmv21.5MB
  • 09.Account Management/03.Limiting characters in passwords.wmv9.13MB
  • 09.Account Management/04.Emailing credentials on account creation.wmv3.76MB
  • 09.Account Management/05.Account enumeration.wmv12.19MB
  • 09.Account Management/06.Denial of service via password reset.wmv3.52MB
  • 09.Account Management/07.Correctly securing the reset processes.wmv5.19MB
  • 09.Account Management/08.Establishing insecure password storage.wmv16.65MB
  • 09.Account Management/09.Testing for risks in the 'remember me' feature.wmv13.36MB
  • 09.Account Management/10.Re-authenticating before key actions.wmv6.17MB
  • 09.Account Management/11.Testing for authentication brute force.wmv13.01MB
  • 09.Account Management/12.Summary.wmv7.91MB