Pluralsight - Ethical Hacking - Hacking Web Applications

seeders: 0
leechers: 0
Added on October 18, 2015 by krish.princein Books
Torrent verified.



Pluralsight - Ethical Hacking - Hacking Web Applications (Size: 667.81 MB)
 01_01-overview.mp43.57 MB
 01_02-The State of Web Application Security.mp44.37 MB
 01_03-Understanding Web Application Security.mp49.46 MB
 01_04-Query Strings, Routing, and HTTP Verbs.mp410.44 MB
 01_05-The Discoverability of Client Security Constructs.mp414.62 MB
 01_06-Protections Offered by Browsers.mp414.02 MB
 01_07-What the Browser Cant Defend Against.mp43.28 MB
 01_08-Whats Not Covered in This Course.mp41.84 MB
 01_09-Summary.mp42.8 MB
 02_01-Overview.mp43.05 MB
 02_02-Spidering with NetSparker.mp419.65 MB
 02_03-Forced Browsing with Burp Suite.mp420.99 MB
 02_04-Directory Traversal.mp427.2 MB
 02_05-Banner Grabbing with Wget.mp44.86 MB
 02_06-Server Fingerprinting with Nmap.mp46.68 MB
 02_07-Discovery of Development Artefacts with Acunetix.mp414.35 MB
 02_08-Discovery of Services via Generated Documentation.mp410.4 MB
 02_09-Discovering Framework Risks.mp414.3 MB
 02_10-Identifying Vulnerable Targets with Shodan.mp46.56 MB
 02_11-Summary.mp42.25 MB
 03_01-Overview.mp42.77 MB
 03_02-OWASP and the Top 10 Web Application Security Risks.mp48.48 MB
 03_03-Understanding Untrusted Data.mp47.59 MB
 03_04-Parameter Tampering.mp415.81 MB
 03_05-Hidden Field Tampering.mp48.06 MB
 03_06-Mass Assignment Attacks.mp48.29 MB
 03_07-Cookie Poisoning.mp47.39 MB
 03_08-Insecure Direct Object References.mp49.93 MB
 03_09-Defending Against Tampering.mp45.46 MB
 03_10-Summary.mp42.01 MB
 04_01-Overview.mp42.68 MB
 04_02-Reflected Cross Site Scripting XSS.mp427.21 MB
 04_03-Persistent Cross Site Scripting XSS.mp412.55 MB
 04_04-Defending Against XSS Attacks.mp44.41 MB
 04_05-Identifying XSS Risks and Evading Filters.mp49.96 MB
 04_06-Client Only Validation.mp414.75 MB
 04_07-Insufficient Transport Layer Security.mp421.68 MB
 04_08-Cross Site Request Forgery CSRF.mp420.64 MB
 04_09-Summary.mp43.68 MB
 05_01-overview.mp44.15 MB
 05_02-Understanding Weaknesses in Identity Management.mp44.19 MB
 05_03-Identity Enumeration.mp415.36 MB
 05_04-Weaknesses in the Remember Me Feature.mp414.58 MB
 05_05-Resources Missing Access Controls.mp48.42 MB
 05_06-Insufficient Access Controls.mp410.71 MB
 05_07-Privilege Elevation.mp49.39 MB
 05_08-Summary.mp43.04 MB
 06_01-Overview.mp43.26 MB
 06_02-Understanding DoS.mp45.66 MB
 06_03-Exploiting Password Resets.mp43.37 MB
 06_04-Exploiting Account Lockouts.mp46.1 MB
 06_05-Distributed Denial of Service DDoS.mp422.3 MB
 06_06-Automating DDoS Attacks with LOIC.mp412.25 MB
 06_07-DDoS as a Service.mp48.34 MB
 06_08-Features at Risk of a DDoS Attack.mp45.52 MB
 06_09-Other DDoS Attacks and Mitigations.mp411.31 MB
 06_10-Summary.mp43.92 MB
 07_01-Overview.mp43.83 MB
 07_02-Improper Error Handling.mp430.89 MB
 07_03-Understanding Salted Hashes.mp47.89 MB
 07_04-Insecure Cryptographic Storage.mp427.41 MB
 07_05-Unvalidated Redirects and Forwards.mp413.94 MB
 07_06-Exposed Exceptions Logs with ELMAH.mp417.08 MB
 07_07-Vulnerabilities in Web Services.mp412.01 MB
 07_08-Summary.mp44.41 MB
 ethicalhackingwebapplications.zip10.43 MB

Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
667.81 MB
seeders:0
leechers:0
Pluralsight - Ethical Hacking - Hacking Web Applications