搜索
Hack Yourself First - How to go on the Cyber-Offense
磁力链接/BT种子名称
Hack Yourself First - How to go on the Cyber-Offense
磁力链接/BT种子简介
种子哈希:
585f018cf297665bb8b9c7cd35b2aa32a28398a3
文件大小:
1.03G
已经下载:
259
次
下载速度:
极快
收录时间:
2017-02-08
最近下载:
2024-11-05
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:585F018CF297665BB8B9C7CD35B2AA32A28398A3
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
某高中
超嫩极品小母狗萝莉
儿子小姨
91狮子座
会所四处游走泳池戏水更衣偷拍
探花鬼脚七酒店+3000元约炮+极品爆乳御姐
某某
young beautiful
女s调教
三上悠亚 无码
流欲
格林生物
neko+akatsuki猫伪娘
丽丽安
新流出酒店
勇闯天涯
summer+time+rendering
千人斩探花4p
รวมมาlภาค
列下
阿旺新传
joy 2015 tigole
黄怡然
恬恬合集
激情车震
约学妹开房
大国大城
업
可爱宝宝
极度裸露
文件列表
02.Transport Layer Protection/06.How loading login forms over HTTP is risky.wmv
45.2 MB
hack-yourself-first.zip
35.6 MB
06.Parameter Tampering/05.Testing for missing server side validation.wmv
33.1 MB
08.Cross Site Attacks/06.Mounting a clickjacking attack.wmv
31.0 MB
06.Parameter Tampering/09.Fuzz testing.wmv
29.5 MB
02.Transport Layer Protection/05.The risk of sending cookies over insecure connections.wmv
28.2 MB
07.SQL Injection/07.Blind SQL injection.wmv
27.8 MB
08.Cross Site Attacks/05.Testing cross site request forgery against APIs.wmv
27.3 MB
04.Cookies/05.Restricting cookie access by path.wmv
24.2 MB
03.Cross Site Scripting (XSS)/07.Testing for the risk of persistent XSS.wmv
24.0 MB
07.SQL Injection/04.Discovering database structure via injection.wmv
23.9 MB
08.Cross Site Attacks/04.The role of anti-forgery tokens.wmv
22.7 MB
09.Account Management/02.Understanding password strength and attack vectors.wmv
22.5 MB
02.Transport Layer Protection/07.Exploiting mixed-mode content.wmv
21.5 MB
06.Parameter Tampering/08.HTTP verb tampering.wmv
21.5 MB
06.Parameter Tampering/03.Capturing requests and manipulating parameters.wmv
20.9 MB
05.Internal Implementation Disclosure/09.Lack of access controls on diagnostic data.wmv
20.9 MB
05.Internal Implementation Disclosure/04.Locating at-risk websites.wmv
20.8 MB
04.Cookies/03.Understanding HttpOnly cookies.wmv
20.2 MB
05.Internal Implementation Disclosure/08.Internal error message leakage.wmv
18.9 MB
06.Parameter Tampering/02.Identifying untrusted data in HTTP request parameters.wmv
18.8 MB
04.Cookies/04.Understanding secure cookies.wmv
17.6 MB
09.Account Management/08.Establishing insecure password storage.wmv
17.5 MB
03.Cross Site Scripting (XSS)/08.The X-XSS-Protection header.wmv
17.3 MB
06.Parameter Tampering/07.Executing a mass assignment attack.wmv
17.1 MB
05.Internal Implementation Disclosure/02.How an attacker builds a website risk profile.wmv
16.4 MB
02.Transport Layer Protection/08.The HSTS header.wmv
15.9 MB
03.Cross Site Scripting (XSS)/04.Understanding XSS and output encoding.wmv
15.8 MB
03.Cross Site Scripting (XSS)/06.Delivering a payload via reflected XSS.wmv
15.5 MB
06.Parameter Tampering/04.Manipulating application logic via parameters.wmv
15.4 MB
08.Cross Site Attacks/03.Testing for a cross site request forgery risk.wmv
14.9 MB
07.SQL Injection/02.Understanding SQL injection.wmv
14.9 MB
05.Internal Implementation Disclosure/05.HTTP fingerprinting of servers.wmv
14.8 MB
07.SQL Injection/03.Testing for injection risks.wmv
14.6 MB
01.Introduction/03.Introducing a vulnerable website – Supercar Showdown.wmv
14.6 MB
09.Account Management/09.Testing for risks in the 'remember me' feature.wmv
14.0 MB
07.SQL Injection/08.Secure app patterns.wmv
13.8 MB
09.Account Management/11.Testing for authentication brute force.wmv
13.6 MB
07.SQL Injection/06.Automating attacks with Havij.wmv
13.6 MB
01.Introduction/04.Using Chrome's developer tools.wmv
13.3 MB
04.Cookies/06.Reducing risk with cookie expiration.wmv
13.0 MB
09.Account Management/05.Account enumeration.wmv
12.8 MB
02.Transport Layer Protection/04.Protecting sensitive data in transit.wmv
12.5 MB
05.Internal Implementation Disclosure/03.Server response header disclosure.wmv
12.2 MB
04.Cookies/02.Cookies 101.wmv
10.7 MB
03.Cross Site Scripting (XSS)/02.Understanding untrusted data and sanitisation.wmv
10.3 MB
03.Cross Site Scripting (XSS)/05.Identifying the use of output encoding.wmv
9.7 MB
09.Account Management/03.Limiting characters in passwords.wmv
9.6 MB
04.Cookies/07.Using session cookies to further reduce risk.wmv
9.3 MB
01.Introduction/06.Modifying requests and responses in Fiddler.wmv
9.2 MB
07.SQL Injection/09.Summary.wmv
9.0 MB
01.Introduction/05.Monitoring and composing requests with Fiddler.wmv
8.8 MB
07.SQL Injection/05.Harvesting data via injection.wmv
8.6 MB
06.Parameter Tampering/10.Summary.wmv
8.5 MB
09.Account Management/12.Summary.wmv
8.3 MB
03.Cross Site Scripting (XSS)/03.Establishing input sanitisation practices.wmv
8.2 MB
08.Cross Site Attacks/02.Understanding cross site attacks.wmv
8.1 MB
05.Internal Implementation Disclosure/07.The risks in HTML source.wmv
7.9 MB
05.Internal Implementation Disclosure/06.Disclosure via robots.txt.wmv
7.8 MB
01.Introduction/02.Why hack yourself first.wmv
7.5 MB
02.Transport Layer Protection/03.Understanding a man in the middle attack.wmv
6.6 MB
05.Internal Implementation Disclosure/10.Summary.wmv
6.5 MB
09.Account Management/10.Re-authenticating before key actions.wmv
6.5 MB
08.Cross Site Attacks/07.Summary.wmv
5.9 MB
09.Account Management/07.Correctly securing the reset processes.wmv
5.4 MB
06.Parameter Tampering/06.Understanding model binding.wmv
5.3 MB
03.Cross Site Scripting (XSS)/09.Summary.wmv
5.1 MB
02.Transport Layer Protection/09.Summary.wmv
4.8 MB
02.Transport Layer Protection/02.The three objectives of transport layer protection.wmv
4.4 MB
04.Cookies/08.Summary.wmv
4.3 MB
09.Account Management/04.Emailing credentials on account creation.wmv
3.9 MB
09.Account Management/01.Introduction.wmv
3.8 MB
09.Account Management/06.Denial of service via password reset.wmv
3.7 MB
01.Introduction/01.About the course.wmv
3.4 MB
06.Parameter Tampering/01.Introduction.wmv
3.4 MB
05.Internal Implementation Disclosure/01.Introduction.wmv
3.1 MB
07.SQL Injection/01.Outline.wmv
3.0 MB
03.Cross Site Scripting (XSS)/01.Introduction.wmv
2.7 MB
02.Transport Layer Protection/01.Introduction.wmv
2.4 MB
08.Cross Site Attacks/01.Introduction.wmv
2.3 MB
04.Cookies/01.Introduction.wmv
1.8 MB
02.Transport Layer Protection/06.How loading login forms over HTTP is risky.srt
25.0 kB
07.SQL Injection/07.Blind SQL injection.srt
22.0 kB
06.Parameter Tampering/05.Testing for missing server side validation.srt
21.1 kB
08.Cross Site Attacks/06.Mounting a clickjacking attack.srt
20.5 kB
06.Parameter Tampering/09.Fuzz testing.srt
20.2 kB
07.SQL Injection/04.Discovering database structure via injection.srt
18.0 kB
02.Transport Layer Protection/05.The risk of sending cookies over insecure connections.srt
16.8 kB
08.Cross Site Attacks/04.The role of anti-forgery tokens.srt
16.5 kB
09.Account Management/02.Understanding password strength and attack vectors.srt
15.9 kB
08.Cross Site Attacks/05.Testing cross site request forgery against APIs.srt
15.5 kB
06.Parameter Tampering/02.Identifying untrusted data in HTTP request parameters.srt
14.7 kB
05.Internal Implementation Disclosure/09.Lack of access controls on diagnostic data.srt
14.5 kB
05.Internal Implementation Disclosure/08.Internal error message leakage.srt
14.4 kB
06.Parameter Tampering/08.HTTP verb tampering.srt
14.3 kB
03.Cross Site Scripting (XSS)/04.Understanding XSS and output encoding.srt
13.9 kB
02.Transport Layer Protection/07.Exploiting mixed-mode content.srt
13.6 kB
04.Cookies/05.Restricting cookie access by path.srt
13.5 kB
03.Cross Site Scripting (XSS)/06.Delivering a payload via reflected XSS.srt
13.4 kB
07.SQL Injection/02.Understanding SQL injection.srt
13.4 kB
06.Parameter Tampering/03.Capturing requests and manipulating parameters.srt
12.8 kB
05.Internal Implementation Disclosure/05.HTTP fingerprinting of servers.srt
12.2 kB
06.Parameter Tampering/07.Executing a mass assignment attack.srt
12.0 kB
07.SQL Injection/08.Secure app patterns.srt
11.6 kB
09.Account Management/08.Establishing insecure password storage.srt
11.5 kB
09.Account Management/11.Testing for authentication brute force.srt
11.2 kB
09.Account Management/05.Account enumeration.srt
11.0 kB
07.SQL Injection/03.Testing for injection risks.srt
10.9 kB
08.Cross Site Attacks/03.Testing for a cross site request forgery risk.srt
10.8 kB
03.Cross Site Scripting (XSS)/07.Testing for the risk of persistent XSS.srt
10.6 kB
05.Internal Implementation Disclosure/02.How an attacker builds a website risk profile.srt
10.0 kB
03.Cross Site Scripting (XSS)/02.Understanding untrusted data and sanitisation.srt
9.9 kB
07.SQL Injection/06.Automating attacks with Havij.srt
9.8 kB
04.Cookies/02.Cookies 101.srt
9.7 kB
06.Parameter Tampering/04.Manipulating application logic via parameters.srt
9.6 kB
05.Internal Implementation Disclosure/03.Server response header disclosure.srt
9.2 kB
05.Internal Implementation Disclosure/04.Locating at-risk websites.srt
9.2 kB
02.Transport Layer Protection/08.The HSTS header.srt
9.1 kB
03.Cross Site Scripting (XSS)/08.The X-XSS-Protection header.srt
8.9 kB
04.Cookies/06.Reducing risk with cookie expiration.srt
8.8 kB
04.Cookies/04.Understanding secure cookies.srt
8.8 kB
09.Account Management/03.Limiting characters in passwords.srt
8.2 kB
02.Transport Layer Protection/04.Protecting sensitive data in transit.srt
7.9 kB
07.SQL Injection/09.Summary.srt
7.7 kB
09.Account Management/09.Testing for risks in the 'remember me' feature.srt
7.6 kB
01.Introduction/04.Using Chrome's developer tools.srt
7.5 kB
03.Cross Site Scripting (XSS)/05.Identifying the use of output encoding.srt
7.3 kB
06.Parameter Tampering/10.Summary.srt
7.1 kB
04.Cookies/03.Understanding HttpOnly cookies.srt
7.0 kB
05.Internal Implementation Disclosure/06.Disclosure via robots.txt.srt
7.0 kB
01.Introduction/03.Introducing a vulnerable website – Supercar Showdown.srt
7.0 kB
09.Account Management/12.Summary.srt
6.7 kB
01.Introduction/05.Monitoring and composing requests with Fiddler.srt
6.5 kB
08.Cross Site Attacks/02.Understanding cross site attacks.srt
6.4 kB
03.Cross Site Scripting (XSS)/03.Establishing input sanitisation practices.srt
6.4 kB
05.Internal Implementation Disclosure/07.The risks in HTML source.srt
6.1 kB
07.SQL Injection/05.Harvesting data via injection.srt
5.9 kB
01.Introduction/02.Why hack yourself first.srt
5.9 kB
09.Account Management/10.Re-authenticating before key actions.srt
5.9 kB
04.Cookies/07.Using session cookies to further reduce risk.srt
5.8 kB
05.Internal Implementation Disclosure/10.Summary.srt
5.2 kB
02.Transport Layer Protection/03.Understanding a man in the middle attack.srt
5.1 kB
08.Cross Site Attacks/07.Summary.srt
5.0 kB
06.Parameter Tampering/06.Understanding model binding.srt
5.0 kB
09.Account Management/07.Correctly securing the reset processes.srt
4.7 kB
01.Introduction/06.Modifying requests and responses in Fiddler.srt
4.5 kB
03.Cross Site Scripting (XSS)/09.Summary.srt
4.1 kB
02.Transport Layer Protection/09.Summary.srt
4.0 kB
02.Transport Layer Protection/02.The three objectives of transport layer protection.srt
4.0 kB
09.Account Management/06.Denial of service via password reset.srt
3.5 kB
09.Account Management/01.Introduction.srt
3.3 kB
04.Cookies/08.Summary.srt
3.3 kB
09.Account Management/04.Emailing credentials on account creation.srt
3.0 kB
06.Parameter Tampering/01.Introduction.srt
2.9 kB
01.Introduction/01.About the course.srt
2.8 kB
07.SQL Injection/01.Outline.srt
2.8 kB
05.Internal Implementation Disclosure/01.Introduction.srt
2.7 kB
03.Cross Site Scripting (XSS)/01.Introduction.srt
2.2 kB
08.Cross Site Attacks/01.Introduction.srt
2.0 kB
02.Transport Layer Protection/01.Introduction.srt
1.8 kB
04.Cookies/01.Introduction.srt
1.7 kB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>