fileHack Yourself First - How to go on the Cyber-Offense

Hack Yourself First How the Cyber Offense
  • WMV01.Introductio.About the course.wmv3.25MB
  • WMV01.Introduction02.Why hack yourself first.wmv7.17MB
  • WMV01.Introduction03.Introducing a vulnerable website – Supercar Showdown.wmv13.94MB
  • WMV01.Introduction04.Using Chrome s developer tools.wmv12.69MB
  • WMV01.Introduction05.Monitoring and composing requests with Fiddler.wmv8.36MB
  • WMV01.Introduction06.Modifying requests and responses in Fiddler.wmv8.75MB
  • WMV02.Transport Layer Protectio.Introduction.wmv2.27MB
  • WMV02.Transport Layer Protection02.The three oectives of transport layer protection.wmv4.18MB
  • WMV02.Transport Layer Protection03.Understanding a n in the middle attack.wmv6.29MB
  • WMV02.Transport Layer Protection04.Protecting sensitive data in transit.wmv11.88MB
  • WMV02.Transport Layer Protection05.The risk of sending cookies over insecure connections.wmv26.91MB
  • WMV02.Transport Layer Protection06.How loading login forms over HTTP is risky.wmv43.06MB
  • WMV02.Transport Layer Protection07.Exploiting mixed-mode content.wmv20.54MB
  • WMV02.Transport Layer Protection08.The HSTS header.wmv15.21MB
  • WMV02.Transport Layer Protection09.Sumry.wmv4.56MB
  • WMV03.Cross Site Scripting (XSS)01.Introduction.wmv2.57MB
  • WMV03.Cross Site Scripting (XSS)02.Understanding untrusted data and sanitisation.wmv9.79MB
  • WMV03.Cross Site Scripting (XSS)03.Establishing input sanitisation practices.wmv7.85MB
  • WMV03.Cross Site Scripting (XSS)04.Understanding XSS and output encoding.wmv15.08MB
  • WMV03.Cross Site Scripting (XSS)05.Identifying the use of output encoding.wmv9.27MB
  • WMV03.Cross Site Scripting (XSS)06.Delivering a payload via reflected XSS.wmv14.78MB
  • WMV03.Cross Site Scripting (XSS)07.Testing for the risk of persistent XSS.wmv22.85MB
  • WMV03.Cross Site Scripting (XSS)08.The X-XSS-Protection header.wmv16.54MB
  • WMV03.Cross Site Scripting (XSS)09.Sumry.wmv4.91MB
  • WMV04.Cookies01.Introduction.wmv1.75MB
  • WMV04.Cookies02.Cookies 101.wmv10.21MB
  • WMV04.Cookies03.Understanding HttpOnly cookies.wmv19.31MB
  • WMV04.Cookies04.Understanding secure cookies.wmv16.83MB
  • WMV04.Cookies05.Restricting cookie access by path.wmv23.11MB
  • WMV04.Cookies06.Reducing risk with cookie expiration.wmv12.36MB
  • WMV04.Cookies07.Using session cookies to further reduce risk.wmv8.86MB
  • WMV04.Cookies08.Sumry.wmv4.10MB
  • WMV05.Internal Implementation Disclosure01.Introduction.wmv2.98MB
  • WMV05.Internal Implementation Disclosure02.How an attacker builds a website risk profile.wmv15.67MB
  • WMV05.Internal Implementation Disclosure03.Server response header disclosure.wmv11.68MB
  • WMV05.Internal Implementation Disclosure04.Locating at-risk websites.wmv19.84MB
  • WMV05.Internal Implementation Disclosure05.HTTP fingerprinting of servers.wmv14.07MB
  • WMV05.Internal Implementation Disclosure06.Disclosure via robots.txt.wmv7.43MB
  • WMV05.Internal Implementation Disclosure07.The risks in HTML source.wmv7.54MB
  • WMV05.Internal error message leakage.wmv17.98MB
  • WMV05.Internal Implementation Disclosure09.Lack of access controls on diagnostic data.wmv19.92MB
  • WMV05.Internal Implementation Disclosure10.Sumry.wmv6.21MB
  • WMV06.Parameter Tampering01.Introduction.wmv3.21MB
  • WMV06.Parameter Tampering02.Identifying untrusted data in HTTP request parameters.wmv17.95MB
  • WMV06.Parameter requests and nipulating parameters.wmv19.94MB
  • WMV06.Parameter Tampering04.nipulating application logic via parameters.wmv14.69MB
  • WMV06.Parameter Tampering05.Testing for missing server side validation.wmv31.58MB
  • WMV06.Parameter Tampering06.Understanding model binding.wmv5.03MB
  • WMV06.Parameter Tampering07.Executing a ss assignment attack.wmv16.30MB
  • WMV06.Parameter Tampering08.HTTP verb tampering.wmv20.47MB
  • WMV06.Parameter Tampering09.Fuzz testing.wmv28.12MB
  • WMV06.Parameter Tampering10.Sumry.wmv8.15MB
  • WMV07.SQL Injectio.Outline.wmv2.91MB
  • WMV07.SQL Injection02.Understanding SQL injection.wmv14.20MB
  • WMV07.SQL Injection03.Testing for injection risks.wmv13.95MB
  • WMV07.SQL Injection04.Discovering database structure via injection.wmv22.83MB
  • WMV07.SQL Injection05.Harvesting data via injection.wmv8.25MB
  • WMV07.SQL Injection06.Autoting attacks with Hij.wmv12.97MB
  • WMV07.SQL Injection07.Blind SQL injection.wmv26.47MB
  • WMV07.SQL Injection08.Secure app patterns.wmv13.15MB
  • WMV07.SQL Injection09.Sumry.wmv8.62MB
  • WMV08.Cross Site Attacks01.Introduction.wmv2.24MB
  • WMV08.Cross Site Attacks02.Understanding cross site attacks.wmv7.73MB
  • WMV08.Cross Site Attacks03.Testing for a cross site request forgery risk.wmv14.22MB
  • WMV08.Cross Site Attacks04.The role of anti-forgery tokens.wmv21.68MB
  • WMV08.Cross Site Attacks05.Testing cross site request forgery against APIs.wmv26.01MB
  • WMV08.Cross Site Attacks06.Mounting a clickjacking attack.wmv29.53MB
  • WMV08.Cross Site Attacks07.Sumry.wmv5.67MB
  • WMV09.Account nagement01.Introduction.wmv3.60MB
  • WMV09.Account nagement02.Understanding password strength and attack vectors.wmv21.50MB
  • WMV09.Account nagement03.Limiting characters in passwords.wmv9.13MB
  • WMV09.Account nagement04.Emailing credentials on account creation.wmv3.76MB
  • WMV09.Account nagement05.Account enumeration.wmv12.19MB
  • WMV09.Account nagement06.Denial of service via password reset.wmv3.52MB
  • WMV09.Account nagement07.Correctly securing the reset processes.wmv5.19MB
  • WMV09.Account nagement08.Establishing insecure password storage.wmv16.65MB
  • WMV09.Account nagement09.Testing for risks in the remember me feature.wmv13.36MB
  • WMV09.Account nagement10.Re-authenticating before key actions.wmv6.17MB
  • WMV09.Account nagement11.Testing for authentication brute force.wmv13.01MB
  • WMV09.Account nagement12.Summary.wmv7.91MB
  • ZIPhack-yourself-first.zip33.96MB
Latest Search: 1.DCOW-44   2.IDBD-261   3.WOBB-003   4.MIBD-683   5.ZONO-060   6.CABD-021   7.PBD-161   8.SPRD-185   9.DSFR-03   10.CADV-217   11.WSP-017   12.EMAZ-189   13.DV-1291   14.ONSD-698   15.HFF-022   16.FPJS-026   17.MCSR-076   18.ACCE-1051   19.TKO-004   20.UPSM-100   21.BUR-277   22.MUKD-001   23.IDBD-367   24.MIBD-484   25.XV-684   26.AGEMIX-099   27.KBKD-576   28.ONSD-120   29.UMD-382   30.NFD-002   31.MDL-001   32.MIBD-524   33.MDS-309   34.MIBD-019   35.ID-19022   36.XV-878   37.MIBD-752   38.WNZS-133   39.JFB-030   40.SMD-13   41.RKI-194   42.DJNH-05   43.BOIN-083   44.MIBD-658   45.RKI-244   46.WAB-107   47.KV-114   48.KNCS-074   49.SHKD-317   50.ZRO-003   51.DOKS-052   52.TOR-011   53.CO-4663   54.WTK-076   55.NEO-516   56.GCD-121   57.IELE-008   58.AEIL-312   59.MN-008   60.AXDVD-058R   61.MDQ-030   62.GA-028   63.HAVD-775   64.JKO-001   65.ARMD-986   66.EMAU-009   67.GODR-065   68.DOKS-060   69.DSE-557   70.D-077   71.44   72.261   73.003   74.683   75.060   76.021   77.161   78.185   79.03   80.217   81.017   82.   83.1291   84.698   85.022   86.026   87.076   88.1051   89.004   90.100   91.277   92.001   93.367   94.484   95.684   96.099   97.576   98.120   99.382   100.002   101.001   102.524   103.309   104.019   105.19022   106.878   107.752   108.133   109.030   110.13   111.194   112.05   113.083   114.658   115.244   116.107   117.   118.074   119.317   120.003   121.052   122.011   123.4663   124.076   125.516   126.121   127.008   128.312   129.008   130.058R   131.030   132.028   133.775   134.001   135.986   136.009   137.065   138.060   139.557   140.077