搜索
Hack Yourself First - How to go on the Cyber-Offense
磁力链接/BT种子名称
Hack Yourself First - How to go on the Cyber-Offense
磁力链接/BT种子简介
种子哈希:
a4a6ec2c63c0f8463a40d0dd3046af977cdbb96d
文件大小:
1.03G
已经下载:
782
次
下载速度:
极快
收录时间:
2017-02-09
最近下载:
2024-11-28
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:A4A6EC2C63C0F8463A40D0DD3046AF977CDBB96D
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
two evil eyes
酒店偷拍
waaa 288
a.chinese.ghost.story
spa
音无未来
骗初中妹
국 복
红底
kanon miyahara
war.of.the.worlds.2005 1080p
if 2024 uhd
神宮寺+ナオ无码流出
幼类动漫
人妻厕奴
두처제
vam视频
bukkake amat
transformers.2007
熟女探花大屁股
adeless2
【猎奇⚡大开眼界】不能说普通只能说相当炸裂 就真的很神奇 女神带你解锁各种道具 平时生活中傲娇女神,
亚美星
电影
迷玩检察院
輪舞曲duo 夜明けのフォルテシモ ぷにゅぷり
斯图雅
男同sm吃屎
上海工商学院李思颖
dvmm-087
文件列表
01.Introduction/01.About the course.srt
2.8 kB
01.Introduction/01.About the course.wmv
3.4 MB
01.Introduction/02.Why hack yourself first.srt
5.9 kB
01.Introduction/02.Why hack yourself first.wmv
7.5 MB
01.Introduction/03.Introducing a vulnerable website – Supercar Showdown.srt
7.0 kB
01.Introduction/03.Introducing a vulnerable website – Supercar Showdown.wmv
14.6 MB
01.Introduction/04.Using Chrome's developer tools.srt
7.5 kB
01.Introduction/04.Using Chrome's developer tools.wmv
13.3 MB
01.Introduction/05.Monitoring and composing requests with Fiddler.srt
6.5 kB
01.Introduction/05.Monitoring and composing requests with Fiddler.wmv
8.8 MB
01.Introduction/06.Modifying requests and responses in Fiddler.srt
4.5 kB
01.Introduction/06.Modifying requests and responses in Fiddler.wmv
9.2 MB
02.Transport Layer Protection/01.Introduction.srt
1.8 kB
02.Transport Layer Protection/01.Introduction.wmv
2.4 MB
02.Transport Layer Protection/02.The three objectives of transport layer protection.srt
4.0 kB
02.Transport Layer Protection/02.The three objectives of transport layer protection.wmv
4.4 MB
02.Transport Layer Protection/03.Understanding a man in the middle attack.srt
5.1 kB
02.Transport Layer Protection/03.Understanding a man in the middle attack.wmv
6.6 MB
02.Transport Layer Protection/04.Protecting sensitive data in transit.srt
7.9 kB
02.Transport Layer Protection/04.Protecting sensitive data in transit.wmv
12.5 MB
02.Transport Layer Protection/05.The risk of sending cookies over insecure connections.srt
16.8 kB
02.Transport Layer Protection/05.The risk of sending cookies over insecure connections.wmv
28.2 MB
02.Transport Layer Protection/06.How loading login forms over HTTP is risky.srt
25.0 kB
02.Transport Layer Protection/06.How loading login forms over HTTP is risky.wmv
45.2 MB
02.Transport Layer Protection/07.Exploiting mixed-mode content.srt
13.6 kB
02.Transport Layer Protection/07.Exploiting mixed-mode content.wmv
21.5 MB
02.Transport Layer Protection/08.The HSTS header.srt
9.1 kB
02.Transport Layer Protection/08.The HSTS header.wmv
15.9 MB
02.Transport Layer Protection/09.Summary.srt
4.0 kB
02.Transport Layer Protection/09.Summary.wmv
4.8 MB
03.Cross Site Scripting (XSS)/01.Introduction.srt
2.2 kB
03.Cross Site Scripting (XSS)/01.Introduction.wmv
2.7 MB
03.Cross Site Scripting (XSS)/02.Understanding untrusted data and sanitisation.srt
9.9 kB
03.Cross Site Scripting (XSS)/02.Understanding untrusted data and sanitisation.wmv
10.3 MB
03.Cross Site Scripting (XSS)/03.Establishing input sanitisation practices.srt
6.4 kB
03.Cross Site Scripting (XSS)/03.Establishing input sanitisation practices.wmv
8.2 MB
03.Cross Site Scripting (XSS)/04.Understanding XSS and output encoding.srt
13.9 kB
03.Cross Site Scripting (XSS)/04.Understanding XSS and output encoding.wmv
15.8 MB
03.Cross Site Scripting (XSS)/05.Identifying the use of output encoding.srt
7.3 kB
03.Cross Site Scripting (XSS)/05.Identifying the use of output encoding.wmv
9.7 MB
03.Cross Site Scripting (XSS)/06.Delivering a payload via reflected XSS.srt
13.4 kB
03.Cross Site Scripting (XSS)/06.Delivering a payload via reflected XSS.wmv
15.5 MB
03.Cross Site Scripting (XSS)/07.Testing for the risk of persistent XSS.srt
10.6 kB
03.Cross Site Scripting (XSS)/07.Testing for the risk of persistent XSS.wmv
24.0 MB
03.Cross Site Scripting (XSS)/08.The X-XSS-Protection header.srt
8.9 kB
03.Cross Site Scripting (XSS)/08.The X-XSS-Protection header.wmv
17.3 MB
03.Cross Site Scripting (XSS)/09.Summary.srt
4.1 kB
03.Cross Site Scripting (XSS)/09.Summary.wmv
5.1 MB
04.Cookies/01.Introduction.srt
1.7 kB
04.Cookies/01.Introduction.wmv
1.8 MB
04.Cookies/02.Cookies 101.srt
9.7 kB
04.Cookies/02.Cookies 101.wmv
10.7 MB
04.Cookies/03.Understanding HttpOnly cookies.srt
7.0 kB
04.Cookies/03.Understanding HttpOnly cookies.wmv
20.2 MB
04.Cookies/04.Understanding secure cookies.srt
8.8 kB
04.Cookies/04.Understanding secure cookies.wmv
17.6 MB
04.Cookies/05.Restricting cookie access by path.srt
13.5 kB
04.Cookies/05.Restricting cookie access by path.wmv
24.2 MB
04.Cookies/06.Reducing risk with cookie expiration.srt
8.8 kB
04.Cookies/06.Reducing risk with cookie expiration.wmv
13.0 MB
04.Cookies/07.Using session cookies to further reduce risk.srt
5.8 kB
04.Cookies/07.Using session cookies to further reduce risk.wmv
9.3 MB
04.Cookies/08.Summary.srt
3.3 kB
04.Cookies/08.Summary.wmv
4.3 MB
05.Internal Implementation Disclosure/01.Introduction.srt
2.7 kB
05.Internal Implementation Disclosure/01.Introduction.wmv
3.1 MB
05.Internal Implementation Disclosure/02.How an attacker builds a website risk profile.srt
10.0 kB
05.Internal Implementation Disclosure/02.How an attacker builds a website risk profile.wmv
16.4 MB
05.Internal Implementation Disclosure/03.Server response header disclosure.srt
9.2 kB
05.Internal Implementation Disclosure/03.Server response header disclosure.wmv
12.2 MB
05.Internal Implementation Disclosure/04.Locating at-risk websites.srt
9.2 kB
05.Internal Implementation Disclosure/04.Locating at-risk websites.wmv
20.8 MB
05.Internal Implementation Disclosure/05.HTTP fingerprinting of servers.srt
12.2 kB
05.Internal Implementation Disclosure/05.HTTP fingerprinting of servers.wmv
14.8 MB
05.Internal Implementation Disclosure/06.Disclosure via robots.txt.srt
7.0 kB
05.Internal Implementation Disclosure/06.Disclosure via robots.txt.wmv
7.8 MB
05.Internal Implementation Disclosure/07.The risks in HTML source.srt
6.1 kB
05.Internal Implementation Disclosure/07.The risks in HTML source.wmv
7.9 MB
05.Internal Implementation Disclosure/08.Internal error message leakage.srt
14.4 kB
05.Internal Implementation Disclosure/08.Internal error message leakage.wmv
18.9 MB
05.Internal Implementation Disclosure/09.Lack of access controls on diagnostic data.srt
14.5 kB
05.Internal Implementation Disclosure/09.Lack of access controls on diagnostic data.wmv
20.9 MB
05.Internal Implementation Disclosure/10.Summary.srt
5.2 kB
05.Internal Implementation Disclosure/10.Summary.wmv
6.5 MB
06.Parameter Tampering/01.Introduction.srt
2.9 kB
06.Parameter Tampering/01.Introduction.wmv
3.4 MB
06.Parameter Tampering/02.Identifying untrusted data in HTTP request parameters.srt
14.7 kB
06.Parameter Tampering/02.Identifying untrusted data in HTTP request parameters.wmv
18.8 MB
06.Parameter Tampering/03.Capturing requests and manipulating parameters.srt
12.8 kB
06.Parameter Tampering/03.Capturing requests and manipulating parameters.wmv
20.9 MB
06.Parameter Tampering/04.Manipulating application logic via parameters.srt
9.6 kB
06.Parameter Tampering/04.Manipulating application logic via parameters.wmv
15.4 MB
06.Parameter Tampering/05.Testing for missing server side validation.srt
21.1 kB
06.Parameter Tampering/05.Testing for missing server side validation.wmv
33.1 MB
06.Parameter Tampering/06.Understanding model binding.srt
5.0 kB
06.Parameter Tampering/06.Understanding model binding.wmv
5.3 MB
06.Parameter Tampering/07.Executing a mass assignment attack.srt
12.0 kB
06.Parameter Tampering/07.Executing a mass assignment attack.wmv
17.1 MB
06.Parameter Tampering/08.HTTP verb tampering.srt
14.3 kB
06.Parameter Tampering/08.HTTP verb tampering.wmv
21.5 MB
06.Parameter Tampering/09.Fuzz testing.srt
20.2 kB
06.Parameter Tampering/09.Fuzz testing.wmv
29.5 MB
06.Parameter Tampering/10.Summary.srt
7.1 kB
06.Parameter Tampering/10.Summary.wmv
8.5 MB
07.SQL Injection/01.Outline.srt
2.8 kB
07.SQL Injection/01.Outline.wmv
3.0 MB
07.SQL Injection/02.Understanding SQL injection.srt
13.4 kB
07.SQL Injection/02.Understanding SQL injection.wmv
14.9 MB
07.SQL Injection/03.Testing for injection risks.srt
10.9 kB
07.SQL Injection/03.Testing for injection risks.wmv
14.6 MB
07.SQL Injection/04.Discovering database structure via injection.srt
18.0 kB
07.SQL Injection/04.Discovering database structure via injection.wmv
23.9 MB
07.SQL Injection/05.Harvesting data via injection.srt
5.9 kB
07.SQL Injection/05.Harvesting data via injection.wmv
8.6 MB
07.SQL Injection/06.Automating attacks with Havij.srt
9.8 kB
07.SQL Injection/06.Automating attacks with Havij.wmv
13.6 MB
07.SQL Injection/07.Blind SQL injection.srt
22.0 kB
07.SQL Injection/07.Blind SQL injection.wmv
27.8 MB
07.SQL Injection/08.Secure app patterns.srt
11.6 kB
07.SQL Injection/08.Secure app patterns.wmv
13.8 MB
07.SQL Injection/09.Summary.srt
7.7 kB
07.SQL Injection/09.Summary.wmv
9.0 MB
08.Cross Site Attacks/01.Introduction.srt
2.0 kB
08.Cross Site Attacks/01.Introduction.wmv
2.3 MB
08.Cross Site Attacks/02.Understanding cross site attacks.srt
6.4 kB
08.Cross Site Attacks/02.Understanding cross site attacks.wmv
8.1 MB
08.Cross Site Attacks/03.Testing for a cross site request forgery risk.srt
10.8 kB
08.Cross Site Attacks/03.Testing for a cross site request forgery risk.wmv
14.9 MB
08.Cross Site Attacks/04.The role of anti-forgery tokens.srt
16.5 kB
08.Cross Site Attacks/04.The role of anti-forgery tokens.wmv
22.7 MB
08.Cross Site Attacks/05.Testing cross site request forgery against APIs.srt
15.5 kB
08.Cross Site Attacks/05.Testing cross site request forgery against APIs.wmv
27.3 MB
08.Cross Site Attacks/06.Mounting a clickjacking attack.srt
20.5 kB
08.Cross Site Attacks/06.Mounting a clickjacking attack.wmv
31.0 MB
08.Cross Site Attacks/07.Summary.srt
5.0 kB
08.Cross Site Attacks/07.Summary.wmv
5.9 MB
09.Account Management/01.Introduction.srt
3.3 kB
09.Account Management/01.Introduction.wmv
3.8 MB
09.Account Management/02.Understanding password strength and attack vectors.srt
15.9 kB
09.Account Management/02.Understanding password strength and attack vectors.wmv
22.5 MB
09.Account Management/03.Limiting characters in passwords.srt
8.2 kB
09.Account Management/03.Limiting characters in passwords.wmv
9.6 MB
09.Account Management/04.Emailing credentials on account creation.srt
3.0 kB
09.Account Management/04.Emailing credentials on account creation.wmv
3.9 MB
09.Account Management/05.Account enumeration.srt
11.0 kB
09.Account Management/05.Account enumeration.wmv
12.8 MB
09.Account Management/06.Denial of service via password reset.srt
3.5 kB
09.Account Management/06.Denial of service via password reset.wmv
3.7 MB
09.Account Management/07.Correctly securing the reset processes.srt
4.7 kB
09.Account Management/07.Correctly securing the reset processes.wmv
5.4 MB
09.Account Management/08.Establishing insecure password storage.srt
11.5 kB
09.Account Management/08.Establishing insecure password storage.wmv
17.5 MB
09.Account Management/09.Testing for risks in the 'remember me' feature.srt
7.6 kB
09.Account Management/09.Testing for risks in the 'remember me' feature.wmv
14.0 MB
09.Account Management/10.Re-authenticating before key actions.srt
5.9 kB
09.Account Management/10.Re-authenticating before key actions.wmv
6.5 MB
09.Account Management/11.Testing for authentication brute force.srt
11.2 kB
09.Account Management/11.Testing for authentication brute force.wmv
13.6 MB
09.Account Management/12.Summary.srt
6.7 kB
09.Account Management/12.Summary.wmv
8.3 MB
hack-yourself-first.zip
35.6 MB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>