zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Hack Yourself First - How to go on the Cyber-Offense
magnet:?xt=urn:btih:a4a6ec2c63c0f8463a40d0dd3046af977cdbb96d&dn=Hack Yourself First - How to go on the Cyber-Offense
磁力链接详情
文件列表详情
a4a6ec2c63c0f8463a40d0dd3046af977cdbb96d
infohash:
80
文件数量
1 GB
文件大小
2016-11-27 05:03
创建日期
2024-11-5 09:12
最后访问
相关分词
Hack
Yourself
First
-
How
to
go
on
the
Cyber-Offense
01.Introduction/01.About the course.wmv 3.25 MB
01.Introduction/02.Why hack yourself first.wmv 7.17 MB
01.Introduction/03.Introducing a vulnerable website – Supercar Showdown.wmv 13.94 MB
01.Introduction/04.Using Chrome's developer tools.wmv 12.69 MB
01.Introduction/05.Monitoring and composing requests with Fiddler.wmv 8.36 MB
01.Introduction/06.Modifying requests and responses in Fiddler.wmv 8.75 MB
02.Transport Layer Protection/01.Introduction.wmv 2.27 MB
02.Transport Layer Protection/02.The three objectives of transport layer protection.wmv 4.18 MB
02.Transport Layer Protection/03.Understanding a man in the middle attack.wmv 6.29 MB
02.Transport Layer Protection/04.Protecting sensitive data in transit.wmv 11.88 MB
02.Transport Layer Protection/05.The risk of sending cookies over insecure connections.wmv 26.91 MB
02.Transport Layer Protection/06.How loading login forms over HTTP is risky.wmv 43.06 MB
02.Transport Layer Protection/07.Exploiting mixed-mode content.wmv 20.54 MB
02.Transport Layer Protection/08.The HSTS header.wmv 15.21 MB
02.Transport Layer Protection/09.Summary.wmv 4.56 MB
03.Cross Site Scripting (XSS)/01.Introduction.wmv 2.57 MB
03.Cross Site Scripting (XSS)/02.Understanding untrusted data and sanitisation.wmv 9.79 MB
03.Cross Site Scripting (XSS)/03.Establishing input sanitisation practices.wmv 7.85 MB
03.Cross Site Scripting (XSS)/04.Understanding XSS and output encoding.wmv 15.08 MB
03.Cross Site Scripting (XSS)/05.Identifying the use of output encoding.wmv 9.27 MB
03.Cross Site Scripting (XSS)/06.Delivering a payload via reflected XSS.wmv 14.78 MB
03.Cross Site Scripting (XSS)/07.Testing for the risk of persistent XSS.wmv 22.85 MB
03.Cross Site Scripting (XSS)/08.The X-XSS-Protection header.wmv 16.54 MB
03.Cross Site Scripting (XSS)/09.Summary.wmv 4.91 MB
04.Cookies/01.Introduction.wmv 1.75 MB
04.Cookies/02.Cookies 101.wmv 10.21 MB
04.Cookies/03.Understanding HttpOnly cookies.wmv 19.31 MB
04.Cookies/04.Understanding secure cookies.wmv 16.83 MB
04.Cookies/05.Restricting cookie access by path.wmv 23.11 MB
04.Cookies/06.Reducing risk with cookie expiration.wmv 12.35 MB
04.Cookies/07.Using session cookies to further reduce risk.wmv 8.86 MB
04.Cookies/08.Summary.wmv 4.1 MB
05.Internal Implementation Disclosure/01.Introduction.wmv 2.98 MB
05.Internal Implementation Disclosure/02.How an attacker builds a website risk profile.wmv 15.67 MB
05.Internal Implementation Disclosure/03.Server response header disclosure.wmv 11.68 MB
05.Internal Implementation Disclosure/04.Locating at-risk websites.wmv 19.84 MB
05.Internal Implementation Disclosure/05.HTTP fingerprinting of servers.wmv 14.07 MB
05.Internal Implementation Disclosure/06.Disclosure via robots.txt.wmv 7.43 MB
05.Internal Implementation Disclosure/07.The risks in HTML source.wmv 7.54 MB
05.Internal Implementation Disclosure/08.Internal error message leakage.wmv 17.98 MB
05.Internal Implementation Disclosure/09.Lack of access controls on diagnostic data.wmv 19.92 MB
05.Internal Implementation Disclosure/10.Summary.wmv 6.21 MB
06.Parameter Tampering/01.Introduction.wmv 3.21 MB
06.Parameter Tampering/02.Identifying untrusted data in HTTP request parameters.wmv 17.95 MB
06.Parameter Tampering/03.Capturing requests and manipulating parameters.wmv 19.94 MB
06.Parameter Tampering/04.Manipulating application logic via parameters.wmv 14.69 MB
06.Parameter Tampering/05.Testing for missing server side validation.wmv 31.58 MB
06.Parameter Tampering/06.Understanding model binding.wmv 5.03 MB
06.Parameter Tampering/07.Executing a mass assignment attack.wmv 16.3 MB
06.Parameter Tampering/08.HTTP verb tampering.wmv 20.47 MB
06.Parameter Tampering/09.Fuzz testing.wmv 28.12 MB
06.Parameter Tampering/10.Summary.wmv 8.15 MB
07.SQL Injection/01.Outline.wmv 2.91 MB
07.SQL Injection/02.Understanding SQL injection.wmv 14.2 MB
07.SQL Injection/03.Testing for injection risks.wmv 13.95 MB
07.SQL Injection/04.Discovering database structure via injection.wmv 22.83 MB
07.SQL Injection/05.Harvesting data via injection.wmv 8.25 MB
07.SQL Injection/06.Automating attacks with Havij.wmv 12.97 MB
07.SQL Injection/07.Blind SQL injection.wmv 26.47 MB
07.SQL Injection/08.Secure app patterns.wmv 13.15 MB
07.SQL Injection/09.Summary.wmv 8.62 MB
08.Cross Site Attacks/01.Introduction.wmv 2.24 MB
08.Cross Site Attacks/02.Understanding cross site attacks.wmv 7.73 MB
08.Cross Site Attacks/03.Testing for a cross site request forgery risk.wmv 14.22 MB
08.Cross Site Attacks/04.The role of anti-forgery tokens.wmv 21.68 MB
08.Cross Site Attacks/05.Testing cross site request forgery against APIs.wmv 26.01 MB
08.Cross Site Attacks/06.Mounting a clickjacking attack.wmv 29.53 MB
08.Cross Site Attacks/07.Summary.wmv 5.67 MB
09.Account Management/01.Introduction.wmv 3.6 MB
09.Account Management/02.Understanding password strength and attack vectors.wmv 21.5 MB
09.Account Management/03.Limiting characters in passwords.wmv 9.13 MB
09.Account Management/04.Emailing credentials on account creation.wmv 3.76 MB
09.Account Management/05.Account enumeration.wmv 12.19 MB
09.Account Management/06.Denial of service via password reset.wmv 3.52 MB
09.Account Management/07.Correctly securing the reset processes.wmv 5.19 MB
09.Account Management/08.Establishing insecure password storage.wmv 16.65 MB
09.Account Management/09.Testing for risks in the 'remember me' feature.wmv 13.36 MB
09.Account Management/10.Re-authenticating before key actions.wmv 6.17 MB
09.Account Management/11.Testing for authentication brute force.wmv 13.01 MB
09.Account Management/12.Summary.wmv 7.91 MB
其他位置