zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
OWASP Top 10- API Security Playbook
magnet:?xt=urn:btih:888fc1a8182d9074204f3ebf6a77722ce01a231a&dn=OWASP Top 10- API Security Playbook
磁力链接详情
文件列表详情
888fc1a8182d9074204f3ebf6a77722ce01a231a
infohash:
37
文件数量
200.12 MB
文件大小
2021-11-10 07:48
创建日期
2024-11-18 22:03
最后访问
相关分词
OWASP
Top
10-
API
Security
Playbook
08. Security Misconfiguration/02. Common Security Misconfigurations.mp4 9.95 MB
01. Using the OWASP API Top 10/00. Goals of the API Top 10.mp4 8.04 MB
01. Using the OWASP API Top 10/01. Vulnerability Risk Factors.mp4 5.66 MB
02. Broken Object Level Authorization/00. Overview.mp4 3.12 MB
02. Broken Object Level Authorization/01. Attacking Broken Object Level Authorization.mp4 7.22 MB
02. Broken Object Level Authorization/02. Defending Against Broken Object Level Authorization.mp4 4.49 MB
03. Broken User Authentication/00. Understanding Broken Authorization.mp4 7.24 MB
03. Broken User Authentication/01. Storing Passwords Securely.mp4 4.42 MB
03. Broken User Authentication/02. Credential Stuffing.mp4 3.3 MB
03. Broken User Authentication/03. Common JWT Failures.mp4 5.22 MB
03. Broken User Authentication/04. Using API Keys.mp4 4.6 MB
04. Excessive Data Exposure/00. Overview.mp4 5.5 MB
04. Excessive Data Exposure/01. Attacking Excessive Data Exposure.mp4 4.87 MB
04. Excessive Data Exposure/02. Defending Against Excessive Data Exposure.mp4 3.29 MB
05. Lack of Resource and Rate Limiting/00. Overview.mp4 3.79 MB
05. Lack of Resource and Rate Limiting/01. Attacks on Rate Limiting Vulnerabilities.mp4 5.68 MB
05. Lack of Resource and Rate Limiting/02. Rate Limiting Risks.mp4 3.28 MB
05. Lack of Resource and Rate Limiting/03. Rate Limiting Defenses.mp4 6.07 MB
06. Broken Function Level Authorization/00. Overview.mp4 3.25 MB
06. Broken Function Level Authorization/01. Attacks on Function Level Authorization.mp4 7.24 MB
06. Broken Function Level Authorization/02. Function Level Authorization Defenses.mp4 3.89 MB
07. Mass Assignment/00. Overview.mp4 4.57 MB
07. Mass Assignment/01. Attacking Mass Assignment Vulnerabilities.mp4 4.74 MB
07. Mass Assignment/02. Mass Assignment Defenses.mp4 3.32 MB
08. Security Misconfiguration/00. Overview.mp4 7.64 MB
08. Security Misconfiguration/01. Understanding a Vulnerable CORS Implementation.mp4 7.88 MB
00. Course Overview/00. Course Overview.mp4 3.33 MB
09. Injection/00. Overview.mp4 4.02 MB
09. Injection/01. Attacking Injection Vulnerabilities.mp4 7.62 MB
09. Injection/02. Injection Risks.mp4 4.89 MB
09. Injection/03. Injection Defenses.mp4 9.88 MB
10. Improper Assets Management/00. Overview.mp4 4.16 MB
10. Improper Assets Management/01. Attacks on Improper Asset Management.mp4 9.16 MB
10. Improper Assets Management/02. Defending Your Assets.mp4 5.7 MB
11. Insufficient Logging and Monitoring/00. Overview.mp4 4.73 MB
11. Insufficient Logging and Monitoring/01. Effects of Insufficient Logging and Monitoring.mp4 3.44 MB
11. Insufficient Logging and Monitoring/02. Logging and Monitoring for Defense.mp4 4.93 MB
其他位置