搜索
OWASP Top 10 Web Application Security Risks for ASP.NET
磁力链接/BT种子名称
OWASP Top 10 Web Application Security Risks for ASP.NET
磁力链接/BT种子简介
种子哈希:
d6bef20bcf3022e03aa58054423851bc02adbe61
文件大小:
871.94M
已经下载:
516
次
下载速度:
极快
收录时间:
2017-03-03
最近下载:
2025-02-26
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:D6BEF20BCF3022E03AA58054423851BC02ADBE61
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
少女初夜
萝莉岛
最近搜索
転生したらショタハーレムの女王ってマジですか
风月海棠
加藤美惠子
fc2-ppv-4372734
adn-530
.ont
鬼六
带病上岗约战极品模特,全程尖叫不止
mimk-197
台北娜娜da-64
哥哥 狗狗
sony+vegas
嘉敏
探花良家人妻老阿姨
李寻欢偷拍
无码
起高颜值
suzhal the vortex
lost in translation 2003 remux
美容院 老板娘
海呋
抄底大神
ghajini
phantom.thread
妻心
视图第10集
我的丰臀妈妈
国模无美颜
4.0
视频调教
文件列表
Module 08 Insecure Cryptographic Storage/03_Demo Anatomy of an attack.flv
45.6 MB
Module 03 Cross Site Scripting (XSS)/11_Demo ASP.NET request validation.flv
23.2 MB
Module 05 Insecure Direct Object References/08_Demo Building an indirect reference map.flv
21.1 MB
Module 10 Insufficient Transport Layer Protection/03_Demo Anatomy of an attack.flv
20.0 MB
Module 07 Security Misconfiguration/05_Demo Correctly configuring custom errors.flv
17.4 MB
Module 08 Insecure Cryptographic Storage/06_Understanding salt and brute force attacks.flv
17.3 MB
Module 10 Insufficient Transport Layer Protection/05_Demo Understanding secure cookies and forms authentication.flv
15.7 MB
Module 08 Insecure Cryptographic Storage/05_Understanding password storage and hashing.flv
15.6 MB
Module 03 Cross Site Scripting (XSS)/07_Demo Implementing output encoding.flv
14.7 MB
Module 06 Cross Site Request Forgery (CSRF)/05_What makes a CSRF attack possible.flv
14.4 MB
Module 02 Injection/03_Demo Anatomy of an attack.flv
13.9 MB
Module 02 Injection/13_Demo Injection automation with Havij.flv
13.4 MB
Module 09 Failure to Restrict URL Access/07_Demo Role based authorisation with the ASP.NET Role Provider.flv
13.1 MB
Module 08 Insecure Cryptographic Storage/11_Demo Symmetric encryption using DPAPI.flv
13.0 MB
Module 09 Failure to Restrict URL Access/06_Demo Access controls in ASP.NET part 2 The authorize attribute.flv
12.8 MB
Module 03 Cross Site Scripting (XSS)/04_Risk in practice My Space and Samy.flv
12.8 MB
Module 10 Insufficient Transport Layer Protection/06_Demo Securing other cookies in ASP.NET.flv
12.5 MB
Module 02 Injection/10_Demo Whitelisting untrusted data.flv
11.9 MB
Module 08 Insecure Cryptographic Storage/07_Slowing down hashes with the new Membership Provider.flv
11.9 MB
Module 07 Security Misconfiguration/09_Demo Using config transforms to apply secure configurations.flv
11.8 MB
Module 09 Failure to Restrict URL Access/08_Other access controls risk and misconceptions.flv
11.3 MB
Module 09 Failure to Restrict URL Access/05_Demo Access controls in ASP.NET part 1 web.config locations.flv
11.2 MB
Module 03 Cross Site Scripting (XSS)/03_Demo Anatomy of an attack.flv
10.9 MB
Module 10 Insufficient Transport Layer Protection/07_Demo Forcing web forms to use HTTPS.flv
10.7 MB
Module 02 Injection/12_Demo Injection through stored procedures.flv
10.6 MB
Module 07 Security Misconfiguration/03_Demo Anatomy of an attack.flv
10.5 MB
Module 07 Security Misconfiguration/06_Demo Securing web forms tracing.flv
10.4 MB
Module 10 Insufficient Transport Layer Protection/09_Demo Mixed mode HTTPS.flv
10.3 MB
Module 07 Security Misconfiguration/10_Demo Enabling retail mode on the server.flv
10.0 MB
Module 06 Cross Site Request Forgery (CSRF)/07_Demo Implementing an anti-forgery token in MVC.flv
9.8 MB
Module 03 Cross Site Scripting (XSS)/08_Demo Output encoding in web forms.flv
9.7 MB
Module 08 Insecure Cryptographic Storage/04_Risk in practice ABC passwords.flv
9.6 MB
Module 07 Security Misconfiguration/08_Demo Encrypting sensitive parts of the web.config.flv
9.5 MB
Module 01 Introdution/03_Who's doing the hacking.flv
9.4 MB
Module 08 Insecure Cryptographic Storage/08_Other stronger hashing implementations.flv
9.3 MB
Module 10 Insufficient Transport Layer Protection/04_Risk in practice Tunisian ISPs.flv
9.2 MB
Module 10 Insufficient Transport Layer Protection/12_Other HTTPS considerations.flv
9.2 MB
Module 05 Insecure Direct Object References/06_Demo Implementing access controls.flv
9.0 MB
Module 07 Security Misconfiguration/07_Demo Keeping frameworks current with NuGet.flv
9.0 MB
Module 06 Cross Site Request Forgery (CSRF)/03_Demo Anatomy of an attack.flv
9.0 MB
Module 11 Unvalidated Redirects and Forwards/07_Demo implementing referrer checking.flv
8.9 MB
Module 11 Unvalidated Redirects and Forwards/06_Demo implementing a whitelist.flv
8.8 MB
Module 03 Cross Site Scripting (XSS)/12_Demo Reflective versus persistent XSS.flv
8.8 MB
Module 04 Broken Authentication and Session Management/08_Demo Leveraging ASP.NET membership provider for authentication.flv
8.7 MB
Module 08 Insecure Cryptographic Storage/12_What's not cryptographic.flv
8.6 MB
Module 01 Introdution/04_OWASP and the Top 10.flv
8.5 MB
Module 02 Injection/07_Demo The principle of least privilege.flv
8.2 MB
Module 05 Insecure Direct Object References/03_Demo Anatomy of an attack.flv
8.1 MB
Module 10 Insufficient Transport Layer Protection/10_HTTP strict transport security.flv
8.1 MB
Module 02 Injection/11_Demo Entity Framework’s SQL parameterisation.flv
8.1 MB
Module 08 Insecure Cryptographic Storage/09_Things to consider when choosing a hashing implementation.flv
8.1 MB
Module 03 Cross Site Scripting (XSS)/13_Demo Native browser defences.flv
8.0 MB
Module 10 Insufficient Transport Layer Protection/11_Other insufficient HTTPS patterns.flv
7.9 MB
Module 11 Unvalidated Redirects and Forwards/03_Demo Anatomy of an attack.flv
7.9 MB
Module 06 Cross Site Request Forgery (CSRF)/04_Risk in practice Compromised Brazilian modems.flv
7.7 MB
Module 09 Failure to Restrict URL Access/04_Risk in practice Apple AT&T leak.flv
7.5 MB
Module 11 Unvalidated Redirects and Forwards/05_Understanding the value of unvalidated redirects to attackers.flv
7.2 MB
Module 06 Cross Site Request Forgery (CSRF)/08_Demo Web forms approach to anti-forgery tokens.flv
6.9 MB
Module 05 Insecure Direct Object References/05_Understanding direct object references.flv
6.8 MB
Module 10 Insufficient Transport Layer Protection/13_Summary.flv
6.8 MB
Module 10 Insufficient Transport Layer Protection/08_Demo Requiring HTTPS on MVC controllers.flv
6.5 MB
Module 03 Cross Site Scripting (XSS)/06_Output encoding concepts.flv
6.3 MB
Module 05 Insecure Direct Object References/07_Understanding indirect reference maps.flv
6.2 MB
Module 02 Injection/08_Demo Inline SQL parameterisation.flv
6.1 MB
Module 09 Failure to Restrict URL Access/09_Summary.flv
6.1 MB
Module 07 Security Misconfiguration/04_Risk in practice ELMAH.flv
6.1 MB
Module 08 Insecure Cryptographic Storage/10_Understanding symmetric and asymmetric encryption.flv
5.8 MB
Module 04 Broken Authentication and Session Management/07_Demo Securely configuring session persistence.flv
5.7 MB
Module 03 Cross Site Scripting (XSS)/10_Demo Whitelisting allowable values.flv
5.5 MB
Module 06 Cross Site Request Forgery (CSRF)/09_CSRF fallacies and browser defences.flv
5.4 MB
Module 08 Insecure Cryptographic Storage/13_Summary.flv
5.4 MB
Module 07 Security Misconfiguration/11_Summary.flv
5.1 MB
Module 11 Unvalidated Redirects and Forwards/02_OWASP overview and risk rating.flv
5.0 MB
Module 11 Unvalidated Redirects and Forwards/08_Other issues with the unvalidated redirect risk.flv
5.0 MB
Module 10 Insufficient Transport Layer Protection/02_OWASP overview and risk rating.flv
4.9 MB
Module 03 Cross Site Scripting (XSS)/09_Demo Output encoding in MVC.flv
4.8 MB
Module 04 Broken Authentication and Session Management/10_Siding versus fixed forms timeout.flv
4.8 MB
Module 01 Introdution/05_Applying security in depth.flv
4.6 MB
Module 03 Cross Site Scripting (XSS)/15_Summary.flv
4.6 MB
Module 04 Broken Authentication and Session Management/09_Customising session and forms timeouts to minimise risk windows.flv
4.5 MB
Module 02 Injection/06_Defining untrusted data.flv
4.5 MB
Module 04 Broken Authentication and Session Management/06_The risk of session persistence in the URL versus cookies.flv
4.5 MB
Module 06 Cross Site Request Forgery (CSRF)/06_Understanding anti-forgery tokens.flv
4.4 MB
Module 11 Unvalidated Redirects and Forwards/04_Risk in practice US government websites.flv
4.4 MB
Module 02 Injection/09_Demo Stored procedure parameterisation.flv
4.3 MB
Module 09 Failure to Restrict URL Access/03_Demo Anatomy of an attack.flv
4.1 MB
Module 04 Broken Authentication and Session Management/03_Demo Anatomy of an attack.flv
4.0 MB
Module 02 Injection/02_QWASP overwiew and risk rating.flv
3.9 MB
Module 04 Broken Authentication and Session Management/11_Other broken authentication patterns.flv
3.8 MB
Module 06 Cross Site Request Forgery (CSRF)/10_Summary.flv
3.7 MB
Module 03 Cross Site Scripting (XSS)/14_Demo Payload obfuscation.flv
3.7 MB
Module 02 Injection/14_Summary.flv
3.6 MB
Module 01 Introdution/02_Who's getting hacked.flv
3.5 MB
Module 06 Cross Site Request Forgery (CSRF)/02_OWASP overview and risk rating.flv
3.5 MB
Module 08 Insecure Cryptographic Storage/02_OWASP overview and risk rating.flv
3.4 MB
Module 11 Unvalidated Redirects and Forwards/09_Summary.flv
3.4 MB
Module 09 Failure to Restrict URL Access/02_OWASP overview and risk rating.flv
3.3 MB
Module 07 Security Misconfiguration/02_OWASP overview and risk rating.flv
3.3 MB
Module 05 Insecure Direct Object References/04_Risk in practice Citibank.flv
3.1 MB
Module 10 Insufficient Transport Layer Protection/01_Introduction.flv
3.0 MB
Module 04 Broken Authentication and Session Management/12_Summary.flv
2.9 MB
Module 05 Insecure Direct Object References/10_Summary.flv
2.6 MB
Module 03 Cross Site Scripting (XSS)/05_Understanding XSS.flv
2.5 MB
Module 05 Insecure Direct Object References/09_Obfuscation via random surrogate keys.flv
2.5 MB
Module 04 Broken Authentication and Session Management/04_Risk in practice Apple's session fixation.flv
2.4 MB
Module 02 Injection/04_Risk in practice LulzSec and Sony.flv
2.2 MB
Module 03 Cross Site Scripting (XSS)/02_OWASP overview and risk rating.flv
2.2 MB
Module 02 Injection/01_Introduction.flv
2.1 MB
Module 03 Cross Site Scripting (XSS)/01_Introduction.flv
2.0 MB
Module 04 Broken Authentication and Session Management/02_OWASP overview and risk rating.flv
1.9 MB
Module 08 Insecure Cryptographic Storage/01_Introduction.flv
1.9 MB
Module 05 Insecure Direct Object References/02_OWASP overview and risk rating.flv
1.9 MB
Module 02 Injection/05_Understanding SQL injection.flv
1.9 MB
Module 06 Cross Site Request Forgery (CSRF)/01_Introduction.flv
1.7 MB
Module 07 Security Misconfiguration/01_Introduction.flv
1.7 MB
Module 11 Unvalidated Redirects and Forwards/01_Introduction.flv
1.5 MB
Module 09 Failure to Restrict URL Access/01_Introduction.flv
1.5 MB
Module 04 Broken Authentication and Session Management/05_Persisting state in a stateless protocol.flv
1.4 MB
Module 04 Broken Authentication and Session Management/01_Introduction.flv
1.4 MB
Module 01 Introdution/01_Introduction.flv
1.4 MB
Module 05 Insecure Direct Object References/01_Introduction.flv
1.2 MB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>