Create Tool:uTorrent/3320
Create Time:2014-03-29 04:18:06
File Size:269.47 MB
File Count:41
File Hash:3700e7db70495df68cf2271b4fde749c8732f583
01. Introduction/01_01-Introduction.mp4 | 16.94 MB |
02. Injection/02_01-Overview.mp4 | 8.22 MB |
02. Injection/02_02-Mounting an Attack.mp4 | 5.02 MB |
02. Injection/02_03-Defences.mp4 | 9.67 MB |
02. Injection/02_04-The risk in Practice.mp4 | 5.29 MB |
03. Broken Authentication and Session Management/03_01-Overview.mp4 | 5.42 MB |
03. Broken Authentication and Session Management/03_02-Mounting an Attack.mp4 | 9.25 MB |
03. Broken Authentication and Session Management/03_03-Defences.mp4 | 9.89 MB |
03. Broken Authentication and Session Management/03_04-The risk in Practice.mp4 | 3.71 MB |
04. Cross-Site Scripting (XSS)/04_01-Overview.mp4 | 10.24 MB |
04. Cross-Site Scripting (XSS)/04_02-Mounting an Attack.mp4 | 4.30 MB |
04. Cross-Site Scripting (XSS)/04_03-Defences.mp4 | 5.66 MB |
04. Cross-Site Scripting (XSS)/04_04-The risk in Practice.mp4 | 10.03 MB |
05. Insecure Direct Object References/05_01-Overview.mp4 | 5.17 MB |
05. Insecure Direct Object References/05_02-Mounting an Attack.mp4 | 4.26 MB |
05. Insecure Direct Object References/05_03-Defences.mp4 | 10.95 MB |
05. Insecure Direct Object References/05_04-The risk in Practice.mp4 | 3.82 MB |
06. Security Misconfiguration/06_01-Overview.mp4 | 4.08 MB |
06. Security Misconfiguration/06_02-Mounting an Attack.mp4 | 6.26 MB |
06. Security Misconfiguration/06_03-Defences.mp4 | 6.82 MB |
06. Security Misconfiguration/06_04-The risk in Practice.mp4 | 4.63 MB |
07. Sensitive Data Exposure/07_01-Overview.mp4 | 4.80 MB |
07. Sensitive Data Exposure/07_02-Mounting an Attack.mp4 | 8.90 MB |
07. Sensitive Data Exposure/07_03-Defences.mp4 | 6.67 MB |
07. Sensitive Data Exposure/07_04-The risk in Practice.mp4 | 5.18 MB |
08. Missing Function Level Access Control/08_01-Overview.mp4 | 5.81 MB |
08. Missing Function Level Access Control/08_02-Mounting an Attack.mp4 | 6.54 MB |
08. Missing Function Level Access Control/08_03-Defences.mp4 | 8.73 MB |
08. Missing Function Level Access Control/08_04-The risk in Practice.mp4 | 6.01 MB |
09. Cross-Site Request Forgery (CSRF)/09_01-Overview.mp4 | 6.17 MB |
09. Cross-Site Request Forgery (CSRF)/09_02-Mounting an Attack.mp4 | 5.19 MB |
09. Cross-Site Request Forgery (CSRF)/09_03-Defences.mp4 | 7.86 MB |
09. Cross-Site Request Forgery (CSRF)/09_04-The risk in Practice.mp4 | 5.88 MB |
10. Using Components with Known Vulnerabilities/10_01-Overview.mp4 | 5.37 MB |
10. Using Components with Known Vulnerabilities/10_02-Mounting an Attack.mp4 | 4.44 MB |
10. Using Components with Known Vulnerabilities/10_03-Defences.mp4 | 5.72 MB |
10. Using Components with Known Vulnerabilities/10_04-The risk in Practice.mp4 | 4.90 MB |
11. Unvalidated Redirects and Forwards/11_01-Overview.mp4 | 4.80 MB |
11. Unvalidated Redirects and Forwards/11_02-Mounting an Attack.mp4 | 4.63 MB |
11. Unvalidated Redirects and Forwards/11_03-Defences.mp4 | 4.62 MB |
11. Unvalidated Redirects and Forwards/11_04-The risk in Practice.mp4 | 7.63 MB |
http://bt2.rutracker.org/ann?uk=pN1rWqEF97 |
http://retracker.local/announce |
TorrentBank
Copyright © 2024