Create Tool:
Create Time:2023-09-01 19:45:21
File Size:218.51 MB
File Count:73
File Hash:eb1d498ef1af3995a22f3a08a1856b4f4d027998
Get Bonus Downloads Here.url | 183 B |
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 | 4.03 MB |
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt | 2.24 KB |
~Get Your Files Here !/10. Security Misconfiguration/1. Misconfiguration and Patching.mp4 | 5.30 MB |
~Get Your Files Here !/10. Security Misconfiguration/1. Misconfiguration and Patching.vtt | 4.31 KB |
~Get Your Files Here !/10. Security Misconfiguration/2. HTTP Request Chain Misconfigurations.mp4 | 3.40 MB |
~Get Your Files Here !/10. Security Misconfiguration/2. HTTP Request Chain Misconfigurations.vtt | 2.82 KB |
~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.mp4 | 6.50 MB |
~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.vtt | 4.05 KB |
~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.mp4 | 10.70 MB |
~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.vtt | 9.11 KB |
~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.mp4 | 5.97 MB |
~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.vtt | 4.49 KB |
~Get Your Files Here !/11. Improper Inventory Management/2. Demo - Deprecated Functionality.mp4 | 4.41 MB |
~Get Your Files Here !/11. Improper Inventory Management/2. Demo - Deprecated Functionality.vtt | 2.88 KB |
~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.mp4 | 9.17 MB |
~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.vtt | 7.40 KB |
~Get Your Files Here !/12. Unsafe Consumption of APIs/1. Understanding Unsafe Consumption of APIs.mp4 | 4.04 MB |
~Get Your Files Here !/12. Unsafe Consumption of APIs/1. Understanding Unsafe Consumption of APIs.vtt | 3.32 KB |
~Get Your Files Here !/12. Unsafe Consumption of APIs/2. API Consumption Attacks.mp4 | 2.59 MB |
~Get Your Files Here !/12. Unsafe Consumption of APIs/2. API Consumption Attacks.vtt | 2.29 KB |
~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.mp4 | 8.59 MB |
~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.vtt | 6.96 KB |
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.mp4 | 10.37 MB |
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.vtt | 6.64 KB |
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.mp4 | 7.48 MB |
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.vtt | 5.50 KB |
~Get Your Files Here !/3. Broken Object Level Authorization/1. Understanding Broken Object Level Authorization.mp4 | 3.12 MB |
~Get Your Files Here !/3. Broken Object Level Authorization/1. Understanding Broken Object Level Authorization.vtt | 2.16 KB |
~Get Your Files Here !/3. Broken Object Level Authorization/2. Object Level Attacks.mp4 | 4.77 MB |
~Get Your Files Here !/3. Broken Object Level Authorization/2. Object Level Attacks.vtt | 3.76 KB |
~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.mp4 | 10.52 MB |
~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.vtt | 3.34 KB |
~Get Your Files Here !/3. Broken Object Level Authorization/4. Examining Defenses.mp4 | 3.57 MB |
~Get Your Files Here !/3. Broken Object Level Authorization/4. Examining Defenses.vtt | 2.48 KB |
~Get Your Files Here !/4. Broken Authentication/1. Understanding Broken Authentication.mp4 | 3.10 MB |
~Get Your Files Here !/4. Broken Authentication/1. Understanding Broken Authentication.vtt | 2.35 KB |
~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.mp4 | 9.73 MB |
~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.vtt | 7.14 KB |
~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.mp4 | 7.93 MB |
~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.vtt | 5.94 KB |
~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.mp4 | 10.71 MB |
~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.vtt | 4.78 KB |
~Get Your Files Here !/5. Broken Object Property Level Authorization/1. Understanding Broken Object Property Level Authorization.mp4 | 3.88 MB |
~Get Your Files Here !/5. Broken Object Property Level Authorization/1. Understanding Broken Object Property Level Authorization.vtt | 2.97 KB |
~Get Your Files Here !/5. Broken Object Property Level Authorization/2. Object Property Attacks and Defenses.mp4 | 3.71 MB |
~Get Your Files Here !/5. Broken Object Property Level Authorization/2. Object Property Attacks and Defenses.vtt | 3.24 KB |
~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.mp4 | 6.43 MB |
~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.vtt | 3.72 KB |
~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.mp4 | 6.37 MB |
~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.vtt | 4.54 KB |
~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.mp4 | 5.50 MB |
~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.vtt | 4.00 KB |
~Get Your Files Here !/7. Broken Function Level Authorization/1. Attacking Broken Function Level Authorization.mp4 | 5.36 MB |
~Get Your Files Here !/7. Broken Function Level Authorization/1. Attacking Broken Function Level Authorization.vtt | 4.26 KB |
~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.mp4 | 10.82 MB |
~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.vtt | 3.38 KB |
~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.mp4 | 5.82 MB |
~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.vtt | 4.26 KB |
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.mp4 | 6.61 MB |
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.vtt | 4.95 KB |
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.mp4 | 5.78 MB |
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.vtt | 2.91 KB |
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.mp4 | 6.06 MB |
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.vtt | 5.00 KB |
~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.mp4 | 6.43 MB |
~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.vtt | 4.73 KB |
~Get Your Files Here !/9. Server-side Request Forgery/2. Demo - Forging Requests from the Server.mp4 | 4.34 MB |
~Get Your Files Here !/9. Server-side Request Forgery/2. Demo - Forging Requests from the Server.vtt | 3.22 KB |
~Get Your Files Here !/9. Server-side Request Forgery/3. SSRF Defenses.mp4 | 5.22 MB |
~Get Your Files Here !/9. Server-side Request Forgery/3. SSRF Defenses.vtt | 3.86 KB |
~Get Your Files Here !/Bonus Resources.txt | 386 B |
~Get Your Files Here !/playlist.m3u | 2.63 KB |
No trackers found |
TorrentBank
Copyright © 2024