Create Tool:
Create Time:1970-01-01 08:00:00
File Size:2.09 GB
File Count:122
File Hash:7576a9ac1ecd4659d8afefdf480d37f20b4789d8
Exercide Files.zip | 360.95 MB |
3. Cross Site Scripting (XSS)/11 - Demo - ASP NET reequest validation.mp4 | 63.64 MB |
8. Insecure Cryptographic Storage/3 - Demo - Anatomy of an attack.mp4 | 60.06 MB |
5. Insecure Direct Object References/8 - Demo - Building an indirect reference map.mp4 | 42.84 MB |
7. Security Misconfiguration/5 - Demo - Correctly configuring custom errors.mp4 | 39.63 MB |
10. Insufficient Transport Layer Protection/3 - Demo - Anatomy of an attackmp4.mp4 | 38.73 MB |
10. Insufficient Transport Layer Protection/5 - Demo - Understanding secure cookies and froms authentication.mp4 | 37.48 MB |
10. Insufficient Transport Layer Protection/6 - Demo - Securing other cookies in ASP NET.mp4 | 36.45 MB |
2. Injection/3 - Demo - Anatomy of an attack.mp4 | 35.42 MB |
8. Insecure Cryptographic Storage/6 - Understanding salt and brute force attacks.mp4 | 34.09 MB |
6. Cross Site Request Forgery (CSRF)/5 - What make a CSRF attack possible.mp4 | 33.22 MB |
7. Security Misconfiguration/9 - Demo - Using config transforms to apply secure configurations.mp4 | 32.60 MB |
9. Failure to Restrict URL Access/7 - Demo - Role based authorisation with the ASP NET Role Provider.mp4 | 29.23 MB |
10. Insufficient Transport Layer Protection/4 - Risk in practice - Tunisian ISPs.mp4 | 28.80 MB |
7. Security Misconfiguration/8 - Demo - Encrypting sensitive parts of the web-config.mp4 | 28.78 MB |
8. Insecure Cryptographic Storage/7 - Slowing down hashes with new Membership Provider.mp4 | 26.52 MB |
7. Security Misconfiguration/3 - Demo - Anatomy of an attack.mp4 | 25.88 MB |
3. Cross Site Scripting (XSS)/7 - Demo - Implementing output encoding.mp4 | 25.56 MB |
8. Insecure Cryptographic Storage/5 - Understanding password storage and hashing.mp4 | 25.10 MB |
2. Injection/12 - Demo - Injection through stored procedures.mp4 | 24.64 MB |
3. Cross Site Scripting (XSS)/4 - Risk in practice - My Space and Samy.mp4 | 24.55 MB |
8. Insecure Cryptographic Storage/11 - Demo - Symmetric encryption using DPAPI.mp4 | 23.49 MB |
7. Security Misconfiguration/7 - Demo - Keeping frameworks currrent with NuGet.mp4 | 22.17 MB |
10. Insufficient Transport Layer Protection/9 - Demo - Mixed mode HTTPS.mp4 | 21.13 MB |
9. Failure to Restrict URL Access/4 - Risk in practice - Apple AT&T leak.mp4 | 21.11 MB |
9. Failure to Restrict URL Access/6 - Demo - Access controls in ASP NET part 2 - The authorize attribute.mp4 | 21.10 MB |
7. Security Misconfiguration/6 - Demo - Securing web forms tracing.mp4 | 20.83 MB |
5. Insecure Direct Object References/6 - Demo - Implementing access controls.mp4 | 20.01 MB |
9. Failure to Restrict URL Access/5 - Demo - Access controls in ASP NET part 1 - web-config locations.mp4 | 19.61 MB |
2. Injection/10 - Demo - Whitelisting untrusted data.mp4 | 19.56 MB |
10. Insufficient Transport Layer Protection/7 - Demo - Forcing web forms to use HTTPS.mp4 | 19.51 MB |
11. Unvalidated Redirects and Forwards/3 - Demo - Anatomy of an attack.mp4 | 18.78 MB |
6. Cross Site Request Forgery (CSRF)/7 - Demo - Implementing an anti-frogery token in MVC.mp4 | 18.47 MB |
11. Unvalidated Redirects and Forwards/7 - Demo - implementing referrer checking.mp4 | 18.42 MB |
9. Failure to Restrict URL Access/8 - Other access controls risk and misconceptions.mp4 | 18.41 MB |
8. Insecure Cryptographic Storage/4 - Risk in practice - ABC passwords.mp4 | 17.99 MB |
2. Injection/13 - Demo - Injection automation with Havij.mp4 | 17.92 MB |
2. Injection/7 - Demo - The principle of least privilege.mp4 | 17.75 MB |
6. Cross Site Request Forgery (CSRF)/8 - Demo - Web forms approach to anti-frogery tokens.mp4 | 17.49 MB |
3. Cross Site Scripting (XSS)/12 - Demo - Reflective versus persistent XSS.mp4 | 17.43 MB |
6. Cross Site Request Forgery (CSRF)/4 - Risk in practice - Compromised Brazillian modems.mp4 | 17.42 MB |
4. Broken Authentication and Session Management/8 - Demo - Leveraging ASP NET membership provider for authentication.mp4 | 17.40 MB |
7. Security Misconfiguration/4 - Risk in practice - ELMAH.mp4 | 17.06 MB |
11. Unvalidated Redirects and Forwards/6 - Demo - implementing a whitelist.mp4 | 16.74 MB |
3. Cross Site Scripting (XSS)/3 - Demo - Anatomy of an attacker.mp4 | 16.73 MB |
10. Insufficient Transport Layer Protection/12 - Other HTTPS considerations.mp4 | 16.68 MB |
5. Insecure Direct Object References/3 - Demo - Anatomy of an attack.mp4 | 16.52 MB |
10. Insufficient Transport Layer Protection/11 - Other insufficient HTTPS patterns.mp4 | 16.38 MB |
2. Injection/11 - Demo - Entity Framework's SQL parameterisation.mp4 | 16.12 MB |
2. Injection/8 - Demo - Inline SQL parameterisation.mp4 | 15.58 MB |
8. Insecure Cryptographic Storage/8 - Other stronger hashing implemenetations.mp4 | 15.00 MB |
10. Insufficient Transport Layer Protection/13 - Summary.mp4 | 14.94 MB |
8. Insecure Cryptographic Storage/12 - Whats not cryptographic.mp4 | 14.60 MB |
7. Security Misconfiguration/10 - Demo - Enabling retail mode on the server.mp4 | 14.44 MB |
1. Introduction/3 - Who's doing the hacking.mp4 | 14.42 MB |
6. Cross Site Request Forgery (CSRF)/3 - Demo - Anatomy of an attack.mp4 | 14.33 MB |
1. Introduction/4 - OWASP and the Top 10.mp4 | 14.24 MB |
11. Unvalidated Redirects and Forwards/4 - Risk in practice - US government websites.mp4 | 14.05 MB |
8. Insecure Cryptographic Storage/9 - Things to consider when choosing a hashing implementations.mp4 | 14.02 MB |
3. Cross Site Scripting (XSS)/13 - Demo - Native browser defences.mp4 | 13.62 MB |
10. Insufficient Transport Layer Protection/10 - HTTP strict transport security.mp4 | 13.26 MB |
3. Cross Site Scripting (XSS)/8 - Demo - Output encoding in web forms.mp4 | 12.37 MB |
9. Failure to Restrict URL Access/9 - Summary.mp4 | 12.35 MB |
11. Unvalidated Redirects and Forwards/5 - Understanding the value of unvalidated redirects to attackers.mp4 | 12.13 MB |
8. Insecure Cryptographic Storage/13 - Summary.mp4 | 12.03 MB |
10. Insufficient Transport Layer Protection/8 - Demo - Requiring HTTPS on MVC controllers.mp4 | 11.79 MB |
3. Cross Site Scripting (XSS)/10 - Demo - Whitelisting allowable values.mp4 | 11.37 MB |
8. Insecure Cryptographic Storage/10 - Understanding symmetric and asymmetric encryption.mp4 | 10.73 MB |
5. Insecure Direct Object References/7 - Understanding indirect reference maps.mp4 | 10.62 MB |
5. Insecure Direct Object References/4 - Risk in practice - Citibank.mp4 | 10.52 MB |
5. Insecure Direct Object References/5 - Understanding direct object references.mp4 | 10.43 MB |
3. Cross Site Scripting (XSS)/15 - Summary.mp4 | 10.06 MB |
10. Insufficient Transport Layer Protection/2 - OWASP overview and risk rating.mp4 | 10.06 MB |
2. Injection/9 - Demo - Stored procedure parameterisation.mp4 | 10.02 MB |
4. Broken Authentication and Session Management/7 - Demo - Securely configuring session persistence.mp4 | 9.93 MB |
11. Unvalidated Redirects and Forwards/2 - OWASP overview and risk rating.mp4 | 9.84 MB |
3. Cross Site Scripting (XSS)/6 - Output encoding concepts.mp4 | 9.03 MB |
7. Security Misconfiguration/11 - Summary.mp4 | 8.58 MB |
6. Cross Site Request Forgery (CSRF)/9 - CSRF fallacies and browser defences.mp4 | 8.56 MB |
1. Introduction/5 - Applying security in depth.mp4 | 8.15 MB |
11. Unvalidated Redirects and Forwards/8 - Other issues with the unvalidated redirect riskmp4.mp4 | 8.11 MB |
2. Injection/14 - Summary.mp4 | 7.22 MB |
4. Broken Authentication and Session Management/11 - Other broken authentication patterns.mp4 | 6.78 MB |
1. Introduction/2 - Who's getting hacked.mp4 | 6.77 MB |
6. Cross Site Request Forgery (CSRF)/10 - Summary.mp4 | 6.74 MB |
11. Unvalidated Redirects and Forwards/9 - Summary.mp4 | 6.43 MB |
6. Cross Site Request Forgery (CSRF)/6 - Understanding anti-frogery tokens.mp4 | 6.42 MB |
8. Insecure Cryptographic Storage/2 - OWASP overview and risk rating.mp4 | 6.41 MB |
3. Cross Site Scripting (XSS)/9 - Demo - Output encoding in MVC.mp4 | 6.33 MB |
6. Cross Site Request Forgery (CSRF)/2 - OWASP overview and risk rating.mp4 | 6.33 MB |
4. Broken Authentication and Session Management/4 - Risk in practice - Apples's session fixation.mp4 | 6.33 MB |
7. Security Misconfiguration/2 - OWASP overview and risk rating.mp4 | 6.12 MB |
9. Failure to Restrict URL Access/2 - OWASP overview and risk rating.mp4 | 5.97 MB |
9. Failure to Restrict URL Access/3 - Demo - Anatomy of an attack.mp4 | 5.88 MB |
2. Injection/2 - OWASP overview and risk rating.mp4 | 5.87 MB |
4. Broken Authentication and Session Management/12 - Summary.mp4 | 5.71 MB |
4. Broken Authentication and Session Management/6 - The risk of session persistence in the URL versus cookies.mp4 | 5.53 MB |
4. Broken Authentication and Session Management/10 - Siding versus fixed forms timeout.mp4 | 5.35 MB |
4. Broken Authentication and Session Management/9 - Customising session and forms timeouts to minimise risk windows.mp4 | 5.19 MB |
2. Injection/4 - Risk in practice - LulzSec and Sony.mp4 | 4.97 MB |
2. Injection/6 - Defining untrusted data.mp4 | 4.89 MB |
4. Broken Authentication and Session Management/3 - Demo - Anatomy of an attack.mp4 | 4.61 MB |
5. Insecure Direct Object References/9 - Obfuscation via random surrogate keys.mp4 | 4.28 MB |
3. Cross Site Scripting (XSS)/14 - Demo - Payload obfuscation.mp4 | 3.97 MB |
3. Cross Site Scripting (XSS)/2 - OWASP overview and risk rating.mp4 | 3.75 MB |
10. Insufficient Transport Layer Protection/1 - Introduction.mp4 | 3.73 MB |
5. Insecure Direct Object References/10 - Summary.mp4 | 3.66 MB |
4. Broken Authentication and Session Management/2 - OWASP overview and risk rating.mp4 | 3.64 MB |
5. Insecure Direct Object References/2 - OWASP overview and risk rating.mp4 | 3.37 MB |
2. Injection/1 - Introduction.mp4 | 2.99 MB |
3. Cross Site Scripting (XSS)/1 - Introduction.mp4 | 2.79 MB |
3. Cross Site Scripting (XSS)/5 - Understanding XSS.mp4 | 2.68 MB |
8. Insecure Cryptographic Storage/1 - Introduction.mp4 | 2.63 MB |
7. Security Misconfiguration/1 - Introduction.mp4 | 2.24 MB |
2. Injection/5 - Understanding SQL Injection.mp4 | 2.13 MB |
6. Cross Site Request Forgery (CSRF)/1 - Introduction.mp4 | 2.09 MB |
4. Broken Authentication and Session Management/5 - Persisting state in a stateless protocol.mp4 | 2.00 MB |
11. Unvalidated Redirects and Forwards/1 - Introduction.mp4 | 1.79 MB |
9. Failure to Restrict URL Access/1 - Introduction.mp4 | 1.71 MB |
4. Broken Authentication and Session Management/1 - Introduction.mp4 | 1.52 MB |
5. Insecure Direct Object References/1 - Introduction.mp4 | 1.34 MB |
1. Introduction/1 - Introduction.mp4 | 1.31 MB |
udp://tracker.publicbt.com/announce |
udp://glotorrents.pw:6969/announce |
TorrentBank
Copyright © 2024