MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

Hacking Web Applications Security Penetration Testing for Today's DevOps and Cloud Environments

磁力链接/BT种子名称

Hacking Web Applications Security Penetration Testing for Today's DevOps and Cloud Environments

磁力链接/BT种子简介

种子哈希:e1b17e55b32de04534dccf2c1bcfae4cb7123682
文件大小: 1.89G
已经下载:5788次
下载速度:极快
收录时间:2023-12-20
最近下载:2025-12-17

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:E1B17E55B32DE04534DCCF2C1BCFAE4CB7123682
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 小蓝俱乐部 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 母狗园 51动漫 91短视频 抖音Max 海王TV TikTok成人版 PornHub 暗网Xvideo 草榴社区 哆哔涩漫 呦乐园 萝莉岛 搜同 91暗网

最近搜索

昭昭 萝莉 evans stepsiblings 我本是高山 update cwpbd 堕邪女神 n0946 进击的巨人+4k xxx-av合集 宋婷 basic+instinct 高颜值 midd400 紧身衣 反抗 please 2022.5.22爱情故事 张娜 escape 2024 korean 明星换脸文咏珊 ts夏琳 bevan showstars 戴个可爱眼罩的高颜值美女和男友做爱被草到求饶爸爸+爸爸+不要操 zumrat odeon 190身高 mida-282

文件列表

  • Lesson 6 Exploiting Injection-Based Vulnerabilities/005. 6.4 Exploiting SQL Injection Vulnerabilities.mp4 128.4 MB
  • Lesson 5 Authentication and Session Management Vulnerabilities/002. 5.1 Understanding Authentication Schemes in Web Applications and Related Vulnerabilities.mp4 111.5 MB
  • Lesson 8 Exploiting Weak Cryptographic Implementations/002. 8.1 Introducing Cryptography, Encryption, and Hashing Protocols.mp4 108.5 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/009. 4.8 Introducing the Burp Suite.mp4 88.4 MB
  • Lesson 3 Build Your Own Web Application Lab/002. 3.1 Exploring Kali Linux.mp4 87.2 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/004. 4.3 Exploring Shodan, Maltego, Recon-NG, SpiderFoot, and TheHarvester.mp4 82.3 MB
  • Lesson 5 Authentication and Session Management Vulnerabilities/003. 5.2 Exploring Session Management Mechanisms and Related Vulnerabilities.mp4 73.3 MB
  • Lesson 8 Exploiting Weak Cryptographic Implementations/003. 8.2 Identifying Common Flaws in Data Storage and Transmission.mp4 52.4 MB
  • Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/003. 11.2 Exploiting Insecure Direct Object References and Path Traversal.mp4 50.0 MB
  • Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/005. 11.4 Fuzzing Web Applications.mp4 49.7 MB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/009. 7.8 Mitigating XSS and CSRF Vulnerabilities.mp4 45.5 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/011. 4.10 Introducing OpenVAS.mp4 43.1 MB
  • Lesson 2 Overview of Web Applications for Security Professionals/002. 2.1 Understanding the Web Application Protocols.mp4 38.1 MB
  • Lesson 10 Client-side Attacks/003. 10.2 Understanding HTML5 Implementations.mp4 37.9 MB
  • Lesson 2 Overview of Web Applications for Security Professionals/004. 2.3 Surveying Session Management and Cookies.mp4 37.6 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/010. 4.9 Introducing OWASP Zed Application Proxy (ZAP).mp4 36.4 MB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/008. 7.7 Evading Web Application Security Controls.mp4 35.9 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/002. 4.1 Understanding Passive vs. Active Reconnaissance.mp4 33.6 MB
  • Lesson 2 Overview of Web Applications for Security Professionals/008. 2.7 Surveying Docker Containers.mp4 32.5 MB
  • Lesson 10 Client-side Attacks/002. 10.1 Surveying the Client-side Code and Storage.mp4 28.6 MB
  • Lesson 1 Introduction to Web Application Penetration Testing/006. 1.5 Exploring What Programming Languages You Should Know.mp4 27.6 MB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/004. 6.3 Understanding SQL Injection.mp4 26.9 MB
  • Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/002. 11.1 Understanding the Other Common Security Flaws in Web Applications.mp4 26.7 MB
  • Lesson 2 Overview of Web Applications for Security Professionals/003. 2.2 Exploring the HTTP Request and Response.mp4 26.3 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/006. 4.5 Surveying Web Crawlers and Directory Brute Force.mp4 25.5 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/003. 4.2 Using Search Engines and Public Information.mp4 24.9 MB
  • Lesson 9 Attacking Application Programming Interfaces (APIs)/003. 9.2 Exploring the Tools Used to Test the APIs.mp4 24.9 MB
  • Lesson 8 Exploiting Weak Cryptographic Implementations/004. 8.3 Surveying Examples of Crypto-based Attacks and Vulnerabilities.mp4 23.3 MB
  • Lesson 1 Introduction to Web Application Penetration Testing/003. 1.2 Surveying Web Application Penetration Testing Methodologies.mp4 23.2 MB
  • Lesson 2 Overview of Web Applications for Security Professionals/006. 2.5 Exploring Cloud Services.mp4 22.4 MB
  • Lesson 3 Build Your Own Web Application Lab/009. 3.8 Understanding Cyber Ranges and Capture the Flag Events.mp4 22.4 MB
  • Lesson 1 Introduction to Web Application Penetration Testing/005. 1.4 Exploring How Web Applications Have Evolved Over Time.mp4 22.2 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/005. 4.4 Exploring CMS and Framework Identification.mp4 20.8 MB
  • Introduction/001. Introduction.mp4 20.8 MB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/005. 7.4 Exploiting DOM-based XSS Vulnerabilities.mp4 20.0 MB
  • Lesson 9 Attacking Application Programming Interfaces (APIs)/002. 9.1 Understanding the APIs.mp4 18.5 MB
  • Lesson 3 Build Your Own Web Application Lab/008. 3.7 Understanding Web Application Proxies.mp4 18.2 MB
  • Lesson 3 Build Your Own Web Application Lab/007. 3.6 Exploring the Web Security Dojo.mp4 18.1 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/008. 4.7 Introducing Nikto.mp4 17.7 MB
  • Lesson 3 Build Your Own Web Application Lab/006. 3.5 Surveying Hackazon.mp4 16.7 MB
  • Lesson 2 Overview of Web Applications for Security Professionals/009. 2.8 Introducing Kubernetes.mp4 16.4 MB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/003. 6.2 Exploiting Command Injection Vulnerabilities.mp4 15.9 MB
  • Lesson 10 Client-side Attacks/004. 10.3 Understanding AJAX Implementations.mp4 15.8 MB
  • Lesson 8 Exploiting Weak Cryptographic Implementations/005. 8.4 Mitigating Flaws in Cryptographic Implementations.mp4 15.7 MB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/002. 6.1 Understanding Command Injection.mp4 15.4 MB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/004. 7.3 Exploiting Stored XSS Vulnerabilities.mp4 15.3 MB
  • Lesson 1 Introduction to Web Application Penetration Testing/004. 1.3 Understanding the Need for Web Application Penetration Testing.mp4 15.1 MB
  • Lesson 2 Overview of Web Applications for Security Professionals/007. 2.6 Exploring Web Application Frameworks.mp4 14.3 MB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/007. 6.6 Exploiting XML Injection Vulnerabilities.mp4 13.9 MB
  • Summary/001. Summary.mp4 13.5 MB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/003. 7.2 Exploiting Reflected XSS Vulnerabilities.mp4 13.5 MB
  • Lesson 2 Overview of Web Applications for Security Professionals/005. 2.4 Introducing DevOps.mp4 13.4 MB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/008. 6.7 Mitigating Injection Vulnerabilities.mp4 12.8 MB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/007. 7.6 Exploiting CSRF Vulnerabilities.mp4 11.5 MB
  • Lesson 3 Build Your Own Web Application Lab/005. 3.4 Surveying WebGoat.mp4 11.2 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/001. Learning objectives.mp4 11.0 MB
  • Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/004. 11.3 Surveying Information Disclosure Vulnerabilities.mp4 10.3 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/007. 4.6 Understanding How Web Application Scanners Work.mp4 9.9 MB
  • Lesson 3 Build Your Own Web Application Lab/001. Learning objectives.mp4 9.8 MB
  • Lesson 10 Client-side Attacks/005. 10.4 Mitigating AJAX, HTML5, and Client-side Vulnerabilities.mp4 9.7 MB
  • Lesson 3 Build Your Own Web Application Lab/003. 3.2 Introducing Vulnerable Applications.mp4 9.5 MB
  • Lesson 1 Introduction to Web Application Penetration Testing/002. 1.1 Understanding Ethical Hacking and Penetration Testing.mp4 9.4 MB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/006. 6.5 Understanding XML Injection.mp4 9.3 MB
  • Lesson 3 Build Your Own Web Application Lab/004. 3.3 Surveying DVWA.mp4 9.2 MB
  • Lesson 2 Overview of Web Applications for Security Professionals/001. Learning objectives.mp4 9.2 MB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/001. Learning objectives.mp4 9.0 MB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/006. 7.5 Understanding Cross-Site Request Forgery (CSRF).mp4 8.9 MB
  • Lesson 1 Introduction to Web Application Penetration Testing/001. Learning objectives.mp4 8.7 MB
  • Lesson 8 Exploiting Weak Cryptographic Implementations/001. Learning objectives.mp4 7.6 MB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/002. 7.1 Introducing XSS.mp4 7.3 MB
  • Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/001. Learning objectives.mp4 6.9 MB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/001. Learning objectives.mp4 6.7 MB
  • Lesson 5 Authentication and Session Management Vulnerabilities/001. Learning objectives.mp4 5.2 MB
  • Lesson 10 Client-side Attacks/001. Learning objectives.mp4 4.7 MB
  • Lesson 9 Attacking Application Programming Interfaces (APIs)/001. Learning objectives.mp4 3.7 MB
  • Lesson 8 Exploiting Weak Cryptographic Implementations/002. 8.1 Introducing Cryptography, Encryption, and Hashing Protocols en.srt 28.0 kB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/005. 6.4 Exploiting SQL Injection Vulnerabilities en.srt 27.8 kB
  • Lesson 5 Authentication and Session Management Vulnerabilities/002. 5.1 Understanding Authentication Schemes in Web Applications and Related Vulnerabilities en.srt 26.9 kB
  • Lesson 4 Reconnaissance and Profiling Web Applications/009. 4.8 Introducing the Burp Suite en.srt 26.5 kB
  • Lesson 3 Build Your Own Web Application Lab/002. 3.1 Exploring Kali Linux en.srt 22.3 kB
  • Lesson 4 Reconnaissance and Profiling Web Applications/004. 4.3 Exploring Shodan, Maltego, Recon-NG, SpiderFoot, and TheHarvester en.srt 20.3 kB
  • Lesson 2 Overview of Web Applications for Security Professionals/002. 2.1 Understanding the Web Application Protocols en.srt 17.4 kB
  • Lesson 5 Authentication and Session Management Vulnerabilities/003. 5.2 Exploring Session Management Mechanisms and Related Vulnerabilities en.srt 14.8 kB
  • Lesson 4 Reconnaissance and Profiling Web Applications/011. 4.10 Introducing OpenVAS en.srt 14.0 kB
  • Lesson 2 Overview of Web Applications for Security Professionals/004. 2.3 Surveying Session Management and Cookies en.srt 12.5 kB
  • Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/005. 11.4 Fuzzing Web Applications en.srt 11.7 kB
  • Lesson 2 Overview of Web Applications for Security Professionals/006. 2.5 Exploring Cloud Services en.srt 9.8 kB
  • Lesson 2 Overview of Web Applications for Security Professionals/008. 2.7 Surveying Docker Containers en.srt 9.8 kB
  • Lesson 10 Client-side Attacks/003. 10.2 Understanding HTML5 Implementations en.srt 9.7 kB
  • Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/003. 11.2 Exploiting Insecure Direct Object References and Path Traversal en.srt 9.5 kB
  • Lesson 8 Exploiting Weak Cryptographic Implementations/003. 8.2 Identifying Common Flaws in Data Storage and Transmission en.srt 9.3 kB
  • Lesson 1 Introduction to Web Application Penetration Testing/005. 1.4 Exploring How Web Applications Have Evolved Over Time en.srt 8.8 kB
  • Lesson 1 Introduction to Web Application Penetration Testing/003. 1.2 Surveying Web Application Penetration Testing Methodologies en.srt 8.0 kB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/009. 7.8 Mitigating XSS and CSRF Vulnerabilities en.srt 7.7 kB
  • Lesson 9 Attacking Application Programming Interfaces (APIs)/003. 9.2 Exploring the Tools Used to Test the APIs en.srt 7.5 kB
  • Lesson 2 Overview of Web Applications for Security Professionals/003. 2.2 Exploring the HTTP Request and Response en.srt 7.3 kB
  • Lesson 1 Introduction to Web Application Penetration Testing/004. 1.3 Understanding the Need for Web Application Penetration Testing en.srt 7.3 kB
  • Lesson 2 Overview of Web Applications for Security Professionals/007. 2.6 Exploring Web Application Frameworks en.srt 6.8 kB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/004. 6.3 Understanding SQL Injection en.srt 6.8 kB
  • Lesson 10 Client-side Attacks/002. 10.1 Surveying the Client-side Code and Storage en.srt 5.8 kB
  • Lesson 1 Introduction to Web Application Penetration Testing/006. 1.5 Exploring What Programming Languages You Should Know en.srt 5.5 kB
  • Lesson 4 Reconnaissance and Profiling Web Applications/003. 4.2 Using Search Engines and Public Information en.srt 5.5 kB
  • Lesson 8 Exploiting Weak Cryptographic Implementations/004. 8.3 Surveying Examples of Crypto-based Attacks and Vulnerabilities en.srt 5.4 kB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/008. 7.7 Evading Web Application Security Controls en.srt 5.2 kB
  • Lesson 2 Overview of Web Applications for Security Professionals/009. 2.8 Introducing Kubernetes en.srt 5.2 kB
  • Lesson 4 Reconnaissance and Profiling Web Applications/006. 4.5 Surveying Web Crawlers and Directory Brute Force en.srt 5.1 kB
  • Lesson 4 Reconnaissance and Profiling Web Applications/010. 4.9 Introducing OWASP Zed Application Proxy (ZAP) en.srt 5.1 kB
  • Lesson 3 Build Your Own Web Application Lab/008. 3.7 Understanding Web Application Proxies en.srt 5.0 kB
  • Lesson 1 Introduction to Web Application Penetration Testing/002. 1.1 Understanding Ethical Hacking and Penetration Testing en.srt 4.9 kB
  • Lesson 4 Reconnaissance and Profiling Web Applications/005. 4.4 Exploring CMS and Framework Identification en.srt 4.9 kB
  • Lesson 2 Overview of Web Applications for Security Professionals/005. 2.4 Introducing DevOps en.srt 4.8 kB
  • Lesson 4 Reconnaissance and Profiling Web Applications/002. 4.1 Understanding Passive vs. Active Reconnaissance en.srt 4.7 kB
  • Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/002. 11.1 Understanding the Other Common Security Flaws in Web Applications en.srt 4.6 kB
  • Lesson 3 Build Your Own Web Application Lab/007. 3.6 Exploring the Web Security Dojo en.srt 4.4 kB
  • Lesson 3 Build Your Own Web Application Lab/005. 3.4 Surveying WebGoat en.srt 4.1 kB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/004. 7.3 Exploiting Stored XSS Vulnerabilities en.srt 4.0 kB
  • Lesson 4 Reconnaissance and Profiling Web Applications/008. 4.7 Introducing Nikto en.srt 3.8 kB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/003. 6.2 Exploiting Command Injection Vulnerabilities en.srt 3.8 kB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/007. 6.6 Exploiting XML Injection Vulnerabilities en.srt 3.6 kB
  • Lesson 3 Build Your Own Web Application Lab/009. 3.8 Understanding Cyber Ranges and Capture the Flag Events en.srt 3.6 kB
  • Lesson 8 Exploiting Weak Cryptographic Implementations/005. 8.4 Mitigating Flaws in Cryptographic Implementations en.srt 3.5 kB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/005. 7.4 Exploiting DOM-based XSS Vulnerabilities en.srt 3.4 kB
  • Lesson 3 Build Your Own Web Application Lab/006. 3.5 Surveying Hackazon en.srt 3.4 kB
  • Lesson 3 Build Your Own Web Application Lab/004. 3.3 Surveying DVWA en.srt 3.3 kB
  • Lesson 9 Attacking Application Programming Interfaces (APIs)/002. 9.1 Understanding the APIs en.srt 3.3 kB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/008. 6.7 Mitigating Injection Vulnerabilities en.srt 3.0 kB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/003. 7.2 Exploiting Reflected XSS Vulnerabilities en.srt 2.8 kB
  • Lesson 10 Client-side Attacks/004. 10.3 Understanding AJAX Implementations en.srt 2.7 kB
  • Introduction/001. Introduction en.srt 2.7 kB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/002. 6.1 Understanding Command Injection en.srt 2.2 kB
  • Lesson 10 Client-side Attacks/005. 10.4 Mitigating AJAX, HTML5, and Client-side Vulnerabilities en.srt 2.2 kB
  • Lesson 4 Reconnaissance and Profiling Web Applications/007. 4.6 Understanding How Web Application Scanners Work en.srt 2.0 kB
  • Summary/001. Summary en.srt 1.7 kB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/002. 7.1 Introducing XSS en.srt 1.6 kB
  • Lesson 3 Build Your Own Web Application Lab/003. 3.2 Introducing Vulnerable Applications en.srt 1.6 kB
  • Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/004. 11.3 Surveying Information Disclosure Vulnerabilities en.srt 1.4 kB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/006. 7.5 Understanding Cross-Site Request Forgery (CSRF) en.srt 1.3 kB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/007. 7.6 Exploiting CSRF Vulnerabilities en.srt 1.3 kB
  • Lesson 4 Reconnaissance and Profiling Web Applications/001. Learning objectives en.srt 1.3 kB
  • Lesson 3 Build Your Own Web Application Lab/001. Learning objectives en.srt 1.2 kB
  • Lesson 2 Overview of Web Applications for Security Professionals/001. Learning objectives en.srt 1.1 kB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/001. Learning objectives en.srt 1.1 kB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/006. 6.5 Understanding XML Injection en.srt 1.1 kB
  • Lesson 1 Introduction to Web Application Penetration Testing/001. Learning objectives en.srt 1.0 kB
  • Lesson 6 Exploiting Injection-Based Vulnerabilities/001. Learning objectives en.srt 789 Bytes
  • Lesson 8 Exploiting Weak Cryptographic Implementations/001. Learning objectives en.srt 770 Bytes
  • Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/001. Learning objectives en.srt 683 Bytes
  • Lesson 5 Authentication and Session Management Vulnerabilities/001. Learning objectives en.srt 581 Bytes
  • Lesson 10 Client-side Attacks/001. Learning objectives en.srt 450 Bytes
  • Lesson 9 Attacking Application Programming Interfaces (APIs)/001. Learning objectives en.srt 378 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!