Download link
File List
-
01. Understanding Security in Web Applications/01_01-Overview.mp4 3.57 MB
01. Understanding Security in Web Applications/01_02-The State of Web Application Security.mp4 4.37 MB
01. Understanding Security in Web Applications/01_03-Understanding Web Application Security.mp4 9.46 MB
01. Understanding Security in Web Applications/01_04-Query Strings, Routing, and HTTP Verbs.mp4 10.44 MB
01. Understanding Security in Web Applications/01_05-The Discoverability of Client Security Constructs.mp4 14.62 MB
01. Understanding Security in Web Applications/01_06-Protections Offered by Browsers.mp4 14.02 MB
01. Understanding Security in Web Applications/01_07-What the Browser Cant Defend Against.mp4 3.28 MB
01. Understanding Security in Web Applications/01_08-Whats Not Covered in This Course.mp4 1.84 MB
01. Understanding Security in Web Applications/01_09-Summary.mp4 2.8 MB
02. Reconnaissance and Footprinting/02_01-Overview.mp4 3.05 MB
02. Reconnaissance and Footprinting/02_02-Spidering with NetSparker.mp4 19.65 MB
02. Reconnaissance and Footprinting/02_03-Forced Browsing with Burp Suite.mp4 20.99 MB
02. Reconnaissance and Footprinting/02_04-Directory Traversal.mp4 27.2 MB
02. Reconnaissance and Footprinting/02_05-Banner Grabbing with Wget.mp4 4.86 MB
02. Reconnaissance and Footprinting/02_06-Server Fingerprinting with Nmap.mp4 6.68 MB
02. Reconnaissance and Footprinting/02_07-Discovery of Development Artefacts with Acunetix.mp4 14.35 MB
02. Reconnaissance and Footprinting/02_08-Discovery of Services via Generated Documentation.mp4 10.4 MB
02. Reconnaissance and Footprinting/02_09-Discovering Framework Risks.mp4 14.3 MB
02. Reconnaissance and Footprinting/02_10-Identifying Vulnerable Targets with Shodan.mp4 6.56 MB
02. Reconnaissance and Footprinting/02_11-Summary.mp4 2.25 MB
03. Tampering of Untrusted Data/03_01-Overview.mp4 2.77 MB
03. Tampering of Untrusted Data/03_02-OWASP and the Top 10 Web Application Security Risks.mp4 8.48 MB
03. Tampering of Untrusted Data/03_03-Understanding Untrusted Data.mp4 7.59 MB
03. Tampering of Untrusted Data/03_04-Parameter Tampering.mp4 15.81 MB
03. Tampering of Untrusted Data/03_05-Hidden Field Tampering.mp4 8.06 MB
03. Tampering of Untrusted Data/03_06-Mass Assignment Attacks.mp4 8.29 MB
03. Tampering of Untrusted Data/03_07-Cookie Poisoning.mp4 7.39 MB
03. Tampering of Untrusted Data/03_08-Insecure Direct Object References.mp4 9.93 MB
03. Tampering of Untrusted Data/03_09-Defending Against Tampering.mp4 5.46 MB
03. Tampering of Untrusted Data/03_10-Summary.mp4 2.01 MB
04. Attacks Involving the Client/04_01-Overview.mp4 2.68 MB
04. Attacks Involving the Client/04_02-Reflected Cross Site Scripting XSS.mp4 27.21 MB
04. Attacks Involving the Client/04_03-Persistent Cross Site Scripting XSS.mp4 12.55 MB
04. Attacks Involving the Client/04_04-Defending Against XSS Attacks.mp4 4.41 MB
04. Attacks Involving the Client/04_05-Identifying XSS Risks and Evading Filters.mp4 9.96 MB
04. Attacks Involving the Client/04_06-Client Only Validation.mp4 14.75 MB
04. Attacks Involving the Client/04_07-Insufficient Transport Layer Security.mp4 21.68 MB
04. Attacks Involving the Client/04_08-Cross Site Request Forgery CSRF.mp4 20.64 MB
04. Attacks Involving the Client/04_09-Summary.mp4 3.68 MB
05. Attacks Against Identity Management and Access Controls/05_01-Overview.mp4 4.15 MB
05. Attacks Against Identity Management and Access Controls/05_02-Understanding Weaknesses in Identity Management.mp4 4.19 MB
05. Attacks Against Identity Management and Access Controls/05_03-Identity Enumeration.mp4 15.36 MB
05. Attacks Against Identity Management and Access Controls/05_04-Weaknesses in the Remember Me Feature.mp4 14.58 MB
05. Attacks Against Identity Management and Access Controls/05_05-Resources Missing Access Controls.mp4 8.42 MB
05. Attacks Against Identity Management and Access Controls/05_06-Insufficient Access Controls.mp4 10.71 MB
05. Attacks Against Identity Management and Access Controls/05_07-Privilege Elevation.mp4 9.39 MB
05. Attacks Against Identity Management and Access Controls/05_08-Summary.mp4 3.04 MB
06. Denial of Service Attacks/06_01-Overview.mp4 3.26 MB
06. Denial of Service Attacks/06_02-Understanding DoS.mp4 5.66 MB
06. Denial of Service Attacks/06_03-Exploiting Password Resets.mp4 3.37 MB
06. Denial of Service Attacks/06_04-Exploiting Account Lockouts.mp4 6.1 MB
06. Denial of Service Attacks/06_05-Distributed Denial of Service DDoS.mp4 22.3 MB
06. Denial of Service Attacks/06_06-Automating DDoS Attacks with LOIC.mp4 12.25 MB
06. Denial of Service Attacks/06_07-DDoS as a Service.mp4 8.34 MB
06. Denial of Service Attacks/06_08-Features at Risk of a DDoS Attack.mp4 5.52 MB
06. Denial of Service Attacks/06_09-Other DDoS Attacks and Mitigations.mp4 11.31 MB
06. Denial of Service Attacks/06_10-Summary.mp4 3.92 MB
07. Other Attacks on the Server/07_01-Overview.mp4 3.83 MB
07. Other Attacks on the Server/07_02-Improper Error Handling.mp4 30.89 MB
07. Other Attacks on the Server/07_03-Understanding Salted Hashes.mp4 7.89 MB
07. Other Attacks on the Server/07_04-Insecure Cryptographic Storage.mp4 27.41 MB
07. Other Attacks on the Server/07_05-Unvalidated Redirects and Forwards.mp4 13.94 MB
07. Other Attacks on the Server/07_06-Exposed Exceptions Logs with ELMAH.mp4 17.08 MB
07. Other Attacks on the Server/07_07-Vulnerabilities in Web Services.mp4 12.01 MB
07. Other Attacks on the Server/07_08-Summary.mp4 4.41 MB
Exercise files/ethicalhackingwebapplications.zip 10.43 MB
Download Info
-
Tips
“Pluralsight - Ethical Hacking - Hacking Web Applications” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.