| | 01_01-overview.mp4 | 3.57 MB |
| | 01_02-The State of Web Application Security.mp4 | 4.37 MB |
| | 01_03-Understanding Web Application Security.mp4 | 9.46 MB |
| | 01_04-Query Strings, Routing, and HTTP Verbs.mp4 | 10.44 MB |
| | 01_05-The Discoverability of Client Security Constructs.mp4 | 14.62 MB |
| | 01_06-Protections Offered by Browsers.mp4 | 14.02 MB |
| | 01_07-What the Browser Cant Defend Against.mp4 | 3.28 MB |
| | 01_08-Whats Not Covered in This Course.mp4 | 1.84 MB |
| | 01_09-Summary.mp4 | 2.8 MB |
| | 02_01-Overview.mp4 | 3.05 MB |
| | 02_02-Spidering with NetSparker.mp4 | 19.65 MB |
| | 02_03-Forced Browsing with Burp Suite.mp4 | 20.99 MB |
| | 02_04-Directory Traversal.mp4 | 27.2 MB |
| | 02_05-Banner Grabbing with Wget.mp4 | 4.86 MB |
| | 02_06-Server Fingerprinting with Nmap.mp4 | 6.68 MB |
| | 02_07-Discovery of Development Artefacts with Acunetix.mp4 | 14.35 MB |
| | 02_08-Discovery of Services via Generated Documentation.mp4 | 10.4 MB |
| | 02_09-Discovering Framework Risks.mp4 | 14.3 MB |
| | 02_10-Identifying Vulnerable Targets with Shodan.mp4 | 6.56 MB |
| | 02_11-Summary.mp4 | 2.25 MB |
| | 03_01-Overview.mp4 | 2.77 MB |
| | 03_02-OWASP and the Top 10 Web Application Security Risks.mp4 | 8.48 MB |
| | 03_03-Understanding Untrusted Data.mp4 | 7.59 MB |
| | 03_04-Parameter Tampering.mp4 | 15.81 MB |
| | 03_05-Hidden Field Tampering.mp4 | 8.06 MB |
| | 03_06-Mass Assignment Attacks.mp4 | 8.29 MB |
| | 03_07-Cookie Poisoning.mp4 | 7.39 MB |
| | 03_08-Insecure Direct Object References.mp4 | 9.93 MB |
| | 03_09-Defending Against Tampering.mp4 | 5.46 MB |
| | 03_10-Summary.mp4 | 2.01 MB |
| | 04_01-Overview.mp4 | 2.68 MB |
| | 04_02-Reflected Cross Site Scripting XSS.mp4 | 27.21 MB |
| | 04_03-Persistent Cross Site Scripting XSS.mp4 | 12.55 MB |
| | 04_04-Defending Against XSS Attacks.mp4 | 4.41 MB |
| | 04_05-Identifying XSS Risks and Evading Filters.mp4 | 9.96 MB |
| | 04_06-Client Only Validation.mp4 | 14.75 MB |
| | 04_07-Insufficient Transport Layer Security.mp4 | 21.68 MB |
| | 04_08-Cross Site Request Forgery CSRF.mp4 | 20.64 MB |
| | 04_09-Summary.mp4 | 3.68 MB |
| | 05_01-overview.mp4 | 4.15 MB |
| | 05_02-Understanding Weaknesses in Identity Management.mp4 | 4.19 MB |
| | 05_03-Identity Enumeration.mp4 | 15.36 MB |
| | 05_04-Weaknesses in the Remember Me Feature.mp4 | 14.58 MB |
| | 05_05-Resources Missing Access Controls.mp4 | 8.42 MB |
| | 05_06-Insufficient Access Controls.mp4 | 10.71 MB |
| | 05_07-Privilege Elevation.mp4 | 9.39 MB |
| | 05_08-Summary.mp4 | 3.04 MB |
| | 06_01-Overview.mp4 | 3.26 MB |
| | 06_02-Understanding DoS.mp4 | 5.66 MB |
| | 06_03-Exploiting Password Resets.mp4 | 3.37 MB |
| | 06_04-Exploiting Account Lockouts.mp4 | 6.1 MB |
| | 06_05-Distributed Denial of Service DDoS.mp4 | 22.3 MB |
| | 06_06-Automating DDoS Attacks with LOIC.mp4 | 12.25 MB |
| | 06_07-DDoS as a Service.mp4 | 8.34 MB |
| | 06_08-Features at Risk of a DDoS Attack.mp4 | 5.52 MB |
| | 06_09-Other DDoS Attacks and Mitigations.mp4 | 11.31 MB |
| | 06_10-Summary.mp4 | 3.92 MB |
| | 07_01-Overview.mp4 | 3.83 MB |
| | 07_02-Improper Error Handling.mp4 | 30.89 MB |
| | 07_03-Understanding Salted Hashes.mp4 | 7.89 MB |
| | 07_04-Insecure Cryptographic Storage.mp4 | 27.41 MB |
| | 07_05-Unvalidated Redirects and Forwards.mp4 | 13.94 MB |
| | 07_06-Exposed Exceptions Logs with ELMAH.mp4 | 17.08 MB |
| | 07_07-Vulnerabilities in Web Services.mp4 | 12.01 MB |
| | 07_08-Summary.mp4 | 4.41 MB |
| | ethicalhackingwebapplications.zip | 10.43 MB |