Hack Yourself First - How to go on the Cyber-Offense
- 01.Introductio.About the course.wmv3.25MB
- 01.Introduction02.Why hack yourself first.wmv7.17MB
- 01.Introduction03.Introducing a vulnerable website – Supercar Showdown.wmv13.94MB
- 01.Introduction04.Using Chrome s developer tools.wmv12.69MB
- 01.Introduction05.Monitoring and composing requests with Fiddler.wmv8.36MB
- 01.Introduction06.Modifying requests and responses in Fiddler.wmv8.75MB
- 02.Transport Layer Protectio.Introduction.wmv2.27MB
- 02.Transport Layer Protection02.The three oectives of transport layer protection.wmv4.18MB
- 02.Transport Layer Protection03.Understanding a n in the middle attack.wmv6.29MB
- 02.Transport Layer Protection04.Protecting sensitive data in transit.wmv11.88MB
- 02.Transport Layer Protection05.The risk of sending cookies over insecure connections.wmv26.91MB
- 02.Transport Layer Protection06.How loading login forms over HTTP is risky.wmv43.06MB
- 02.Transport Layer Protection07.Exploiting mixed-mode content.wmv20.54MB
- 02.Transport Layer Protection08.The HSTS header.wmv15.21MB
- 02.Transport Layer Protection09.Sumry.wmv4.56MB
- 03.Cross Site Scripting (XSS)01.Introduction.wmv2.57MB
- 03.Cross Site Scripting (XSS)02.Understanding untrusted data and sanitisation.wmv9.79MB
- 03.Cross Site Scripting (XSS)03.Establishing input sanitisation practices.wmv7.85MB
- 03.Cross Site Scripting (XSS)04.Understanding XSS and output encoding.wmv15.08MB
- 03.Cross Site Scripting (XSS)05.Identifying the use of output encoding.wmv9.27MB
- 03.Cross Site Scripting (XSS)06.Delivering a payload via reflected XSS.wmv14.78MB
- 03.Cross Site Scripting (XSS)07.Testing for the risk of persistent XSS.wmv22.85MB
- 03.Cross Site Scripting (XSS)08.The X-XSS-Protection header.wmv16.54MB
- 03.Cross Site Scripting (XSS)09.Sumry.wmv4.91MB
- 04.Cookies01.Introduction.wmv1.75MB
- 04.Cookies02.Cookies 101.wmv10.21MB
- 04.Cookies03.Understanding HttpOnly cookies.wmv19.31MB
- 04.Cookies04.Understanding secure cookies.wmv16.83MB
- 04.Cookies05.Restricting cookie access by path.wmv23.11MB
- 04.Cookies06.Reducing risk with cookie expiration.wmv12.36MB
- 04.Cookies07.Using session cookies to further reduce risk.wmv8.86MB
- 04.Cookies08.Sumry.wmv4.10MB
- 05.Internal Implementation Disclosure01.Introduction.wmv2.98MB
- 05.Internal Implementation Disclosure02.How an attacker builds a website risk profile.wmv15.67MB
- 05.Internal Implementation Disclosure03.Server response header disclosure.wmv11.68MB
- 05.Internal Implementation Disclosure04.Locating at-risk websites.wmv19.84MB
- 05.Internal Implementation Disclosure05.HTTP fingerprinting of servers.wmv14.07MB
- 05.Internal Implementation Disclosure06.Disclosure via robots.txt.wmv7.43MB
- 05.Internal Implementation Disclosure07.The risks in HTML source.wmv7.54MB
- 05.Internal error message leakage.wmv17.98MB
- 05.Internal Implementation Disclosure09.Lack of access controls on diagnostic data.wmv19.92MB
- 05.Internal Implementation Disclosure10.Sumry.wmv6.21MB
- 06.Parameter Tampering01.Introduction.wmv3.21MB
- 06.Parameter Tampering02.Identifying untrusted data in HTTP request parameters.wmv17.95MB
- 06.Parameter requests and nipulating parameters.wmv19.94MB
- 06.Parameter Tampering04.nipulating application logic via parameters.wmv14.69MB
- 06.Parameter Tampering05.Testing for missing server side validation.wmv31.58MB
- 06.Parameter Tampering06.Understanding model binding.wmv5.03MB
- 06.Parameter Tampering07.Executing a ss assignment attack.wmv16.30MB
- 06.Parameter Tampering08.HTTP verb tampering.wmv20.47MB
- 06.Parameter Tampering09.Fuzz testing.wmv28.12MB
- 06.Parameter Tampering10.Sumry.wmv8.15MB
- 07.SQL Injectio.Outline.wmv2.91MB
- 07.SQL Injection02.Understanding SQL injection.wmv14.20MB
- 07.SQL Injection03.Testing for injection risks.wmv13.95MB
- 07.SQL Injection04.Discovering database structure via injection.wmv22.83MB
- 07.SQL Injection05.Harvesting data via injection.wmv8.25MB
- 07.SQL Injection06.Autoting attacks with Hij.wmv12.97MB
- 07.SQL Injection07.Blind SQL injection.wmv26.47MB
- 07.SQL Injection08.Secure app patterns.wmv13.15MB
- 07.SQL Injection09.Sumry.wmv8.62MB
- 08.Cross Site Attacks01.Introduction.wmv2.24MB
- 08.Cross Site Attacks02.Understanding cross site attacks.wmv7.73MB
- 08.Cross Site Attacks03.Testing for a cross site request forgery risk.wmv14.22MB
- 08.Cross Site Attacks04.The role of anti-forgery tokens.wmv21.68MB
- 08.Cross Site Attacks05.Testing cross site request forgery against APIs.wmv26.01MB
- 08.Cross Site Attacks06.Mounting a clickjacking attack.wmv29.53MB
- 08.Cross Site Attacks07.Sumry.wmv5.67MB
- 09.Account nagement01.Introduction.wmv3.60MB
- 09.Account nagement02.Understanding password strength and attack vectors.wmv21.50MB
- 09.Account nagement03.Limiting characters in passwords.wmv9.13MB
- 09.Account nagement04.Emailing credentials on account creation.wmv3.76MB
- 09.Account nagement05.Account enumeration.wmv12.19MB
- 09.Account nagement06.Denial of service via password reset.wmv3.52MB
- 09.Account nagement07.Correctly securing the reset processes.wmv5.19MB
- 09.Account nagement08.Establishing insecure password storage.wmv16.65MB
- 09.Account nagement09.Testing for risks in the remember me feature.wmv13.36MB
- 09.Account nagement10.Re-authenticating before key actions.wmv6.17MB
- 09.Account nagement11.Testing for authentication brute force.wmv13.01MB
- 09.Account nagement12.Summary.wmv7.91MB
- hack-yourself-first.zip33.96MB
- CreateTime2017-11-22
- UpdateTime2018-04-12
- FileTotalCount161
- TotalSize2.07GBHotTimes6ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.DCOW-44 2.IDBD-261 3.WOBB-003 4.MIBD-683 5.ZONO-060 6.CABD-021 7.PBD-161 8.SPRD-185 9.DSFR-03 10.CADV-217 11.WSP-017 12.EMAZ-189 13.DV-1291 14.ONSD-698 15.HFF-022 16.FPJS-026 17.MCSR-076 18.ACCE-1051 19.TKO-004 20.UPSM-100 21.BUR-277 22.MUKD-001 23.IDBD-367 24.MIBD-484 25.XV-684 26.AGEMIX-099 27.KBKD-576 28.ONSD-120 29.UMD-382 30.NFD-002 31.MDL-001 32.MIBD-524 33.MDS-309 34.MIBD-019 35.ID-19022 36.XV-878 37.MIBD-752 38.WNZS-133 39.JFB-030 40.SMD-13 41.RKI-194 42.DJNH-05 43.BOIN-083 44.MIBD-658 45.RKI-244 46.WAB-107 47.KV-114 48.KNCS-074 49.SHKD-317 50.ZRO-003 51.DOKS-052 52.TOR-011 53.CO-4663 54.WTK-076 55.NEO-516 56.GCD-121 57.IELE-008 58.AEIL-312 59.MN-008 60.AXDVD-058R 61.MDQ-030 62.GA-028 63.HAVD-775 64.JKO-001 65.ARMD-986 66.EMAU-009 67.GODR-065 68.DOKS-060 69.DSE-557 70.D-077 71.44 72.261 73.003 74.683 75.060 76.021 77.161 78.185 79.03 80.217 81.017 82. 83.1291 84.698 85.022 86.026 87.076 88.1051 89.004 90.100 91.277 92.001 93.367 94.484 95.684 96.099 97.576 98.120 99.382 100.002 101.001 102.524 103.309 104.019 105.19022 106.878 107.752 108.133 109.030 110.13 111.194 112.05 113.083 114.658 115.244 116.107 117. 118.074 119.317 120.003 121.052 122.011 123.4663 124.076 125.516 126.121 127.008 128.312 129.008 130.058R 131.030 132.028 133.775 134.001 135.986 136.009 137.065 138.060 139.557 140.077