种子简介
种子名称:
[FreeCoursesOnline.Us] ethical-hacking-session-hijacking
文件类型:
视频
文件数目:
53个文件
文件大小:
568.28 MB
收录时间:
2017-12-26 14:27
已经下载:
3次
资源热度:
134
最近下载:
2024-11-11 20:45
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:d78683f72fb974a511ace7c83477204e956d55c4&dn=[FreeCoursesOnline.Us] ethical-hacking-session-hijacking
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[FreeCoursesOnline.Us] ethical-hacking-session-hijacking.torrent
00.Understanding-Session-Hijacking/00.Overview.mp43.87MB
00.Understanding-Session-Hijacking/01.What-Is-Session-Hijacking.mp42.42MB
00.Understanding-Session-Hijacking/02.Types-of-Session-Hijacking.mp44.63MB
00.Understanding-Session-Hijacking/03.Attack-Vectors.mp45.36MB
00.Understanding-Session-Hijacking/04.The-Impact-of-Session-Hijacking.mp48.79MB
00.Understanding-Session-Hijacking/05.Session-Hijacking-and-the-OWASP-Top-10.mp413.52MB
00.Understanding-Session-Hijacking/06.Summary.mp41.81MB
01.Session-Persistence-in-Web-Applications/00.Overview.mp42.52MB
01.Session-Persistence-in-Web-Applications/01.The-Stateless-Nature-of-HTTP.mp45.81MB
01.Session-Persistence-in-Web-Applications/02.Persisting-State-Over-HTTP.mp48.1MB
01.Session-Persistence-in-Web-Applications/03.Session-Persistence-in-Cookies.mp422.45MB
01.Session-Persistence-in-Web-Applications/04.Session-Persistence-in-the-URL.mp415.73MB
01.Session-Persistence-in-Web-Applications/05.Session-Persistence-in-Hidden-Form-Fields.mp45.8MB
01.Session-Persistence-in-Web-Applications/06.Summary.mp43.95MB
02.Hijacking-Sessions-in-Web-Applications/00.Overview.mp43.6MB
02.Hijacking-Sessions-in-Web-Applications/01.Hijacking-Cookies-with-Cross-Site-Scripting.mp430.2MB
02.Hijacking-Sessions-in-Web-Applications/02.Exposed-Cookie-Based-Session-IDs-in-Logs.mp415.8MB
02.Hijacking-Sessions-in-Web-Applications/03.Exposed-URL-Based-Session-IDs-in-Logs.mp420.27MB
02.Hijacking-Sessions-in-Web-Applications/04.Leaking-URL-Persisted-Sessions-in-the-Referrer.mp420.14MB
02.Hijacking-Sessions-in-Web-Applications/05.Session-Sniffing.mp422.58MB
02.Hijacking-Sessions-in-Web-Applications/06.Session-Fixation.mp419.04MB
02.Hijacking-Sessions-in-Web-Applications/07.Brute-Forcing-Session-IDs.mp410.96MB
02.Hijacking-Sessions-in-Web-Applications/08.Session-Donation.mp412.64MB
02.Hijacking-Sessions-in-Web-Applications/09.Summary.mp44.8MB
03.Network-and-Client-Level-Session-Hijacking/00.Overview.mp44.47MB
03.Network-and-Client-Level-Session-Hijacking/01.Understanding-TCP.mp412.82MB
03.Network-and-Client-Level-Session-Hijacking/02.Reviewing-the-Three-way-Handshake-in-Wireshark.mp432.7MB
03.Network-and-Client-Level-Session-Hijacking/03.Generation-and-Predictability-of-TCP-Sequence-Numbers.mp415.85MB
03.Network-and-Client-Level-Session-Hijacking/04.Blind-Hijacking.mp43.48MB
03.Network-and-Client-Level-Session-Hijacking/05.Man-in-the-Middle-Session-Sniffing.mp43.09MB
03.Network-and-Client-Level-Session-Hijacking/06.IP-Spoofing.mp42.07MB
03.Network-and-Client-Level-Session-Hijacking/07.UDP-Hijacking.mp42.91MB
03.Network-and-Client-Level-Session-Hijacking/08.Man-in-the-Browser-Attacks.mp44.37MB
03.Network-and-Client-Level-Session-Hijacking/09.Network-Level-Session-Hijacking-in-the-Wild.mp44.42MB
03.Network-and-Client-Level-Session-Hijacking/10.Summary.mp43.41MB
04.Mitigating-the-Risk-of-Session-Hijacking/00.Overview.mp43.45MB
04.Mitigating-the-Risk-of-Session-Hijacking/01.Use-Strong-Session-IDs.mp44.71MB
04.Mitigating-the-Risk-of-Session-Hijacking/02.Keep-Session-IDs-Out-of-the-URL.mp43.59MB
04.Mitigating-the-Risk-of-Session-Hijacking/03.Dont-Reuse-Session-ID-for-Auth.mp420.1MB
04.Mitigating-the-Risk-of-Session-Hijacking/04.Always-Flag-Session-ID-Cookies-as-HTTP-Only.mp410.67MB
04.Mitigating-the-Risk-of-Session-Hijacking/05.Use-Transport-Layer-Security.mp414.36MB
04.Mitigating-the-Risk-of-Session-Hijacking/06.Always-Flag-Session-ID-Cookies-as-Secure.mp423.93MB
04.Mitigating-the-Risk-of-Session-Hijacking/07.Session-Expiration-and-Using-Session-Cookies.mp414.77MB
04.Mitigating-the-Risk-of-Session-Hijacking/08.Consider-Disabling-Sliding-Sessions.mp44.62MB
04.Mitigating-the-Risk-of-Session-Hijacking/09.Encourage-Users-to-Log-Out.mp44.21MB
04.Mitigating-the-Risk-of-Session-Hijacking/10.Re-authenticate-Before-Key-Actions.mp43.09MB
04.Mitigating-the-Risk-of-Session-Hijacking/11.Summary.mp44.78MB
05.Automating-Session-Hijack-Attacks/00.Overview.mp43.05MB
05.Automating-Session-Hijack-Attacks/01.Manipulating-Session-IDs-with-OWASP-ZAP.mp417.65MB
05.Automating-Session-Hijack-Attacks/02.Testing-Session-Token-Strength-with-Burp-Suite.mp430.26MB
05.Automating-Session-Hijack-Attacks/03.Dynamic-Analysis-Testing-with-NetSparker.mp425.77MB
05.Automating-Session-Hijack-Attacks/04.Other-Tools.mp421.81MB
05.Automating-Session-Hijack-Attacks/05.Summary.mp43.11MB