589689.xyz

[ ] Udemy - Internet Of Things Security - VAPT of IoT devices

  • 收录时间:2021-09-04 06:20:31
  • 文件大小:1GB
  • 下载次数:1
  • 最近下载:2021-09-04 06:20:31
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/4. Radio protocols exploitation of IoT devices/3. Bluetooth Low Energy (BLE) exploitation.mp4 73MB
  2. ~Get Your Files Here !/4. Radio protocols exploitation of IoT devices/4. ZigBee exploitation.mp4 72MB
  3. ~Get Your Files Here !/1. Introduction to IoT Security/1. IoT Security Standards and Guidelines.mp4 60MB
  4. ~Get Your Files Here !/2. VAPT methodology for IoT/4. Threat modeling.mp4 48MB
  5. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/2. Help tools for Web Application VAPT.mp4 48MB
  6. ~Get Your Files Here !/3. Hardware exploitation of IoT devices/1. UART exploitation.mp4 46MB
  7. ~Get Your Files Here !/1. Introduction to IoT Security/3. IoT Communication Protocols.mp4 44MB
  8. ~Get Your Files Here !/3. Hardware exploitation of IoT devices/2. I2C exploitation.mp4 43MB
  9. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/11. Unvalidated File Upload attack Lab.mp4 41MB
  10. ~Get Your Files Here !/4. Radio protocols exploitation of IoT devices/1. Frequency ranges used by IoT radio protocols and SDR tools.mp4 39MB
  11. ~Get Your Files Here !/4. Radio protocols exploitation of IoT devices/2. Replay attacks and countermeasures.mp4 36MB
  12. ~Get Your Files Here !/3. Hardware exploitation of IoT devices/4. JTAG exploitation.mp4 36MB
  13. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/16. XXE (XML External Entities) Attack Lab.mp4 36MB
  14. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/9. OS command Inject attack Lab.mp4 35MB
  15. ~Get Your Files Here !/2. VAPT methodology for IoT/1. Typical attacks to IoT.mp4 33MB
  16. ~Get Your Files Here !/3. Hardware exploitation of IoT devices/5. Firmware extraction and analysis.mp4 32MB
  17. ~Get Your Files Here !/3. Hardware exploitation of IoT devices/3. SPI exploitation.mp4 32MB
  18. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/4. XSS attack.mp4 32MB
  19. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/6. SQL Injection attack.mp4 31MB
  20. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/5. XSS attack Lab.mp4 28MB
  21. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/7. SQL Injection attack Lab.mp4 27MB
  22. ~Get Your Files Here !/2. VAPT methodology for IoT/3. Risk analysis.mp4 26MB
  23. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/13. Local and Remote File Inclusion attacks Lab.mp4 25MB
  24. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/15. XXE (XML External Entities) attack.mp4 21MB
  25. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/3. Input validation.mp4 21MB
  26. ~Get Your Files Here !/2. VAPT methodology for IoT/2. IoT Vulnerability Assessment and PenTest phases.mp4 20MB
  27. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/8. OS command Inject attack.mp4 20MB
  28. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/12. Local and Remote File Inclusion attacks.mp4 18MB
  29. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/1. OWASP Web Security Testing Guide.mp4 16MB
  30. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/14. Insecure Deserialization attack.mp4 16MB
  31. ~Get Your Files Here !/1. Introduction to IoT Security/2. Architecture of an IoT system.mp4 15MB
  32. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/10. Unvalidated File Upload attack.mp4 11MB
  33. ~Get Your Files Here !/4. Radio protocols exploitation of IoT devices/4. ZigBee exploitation-en_US.srt 11KB
  34. ~Get Your Files Here !/4. Radio protocols exploitation of IoT devices/3. Bluetooth Low Energy (BLE) exploitation-en_US.srt 10KB
  35. ~Get Your Files Here !/1. Introduction to IoT Security/3. IoT Communication Protocols-en_US.srt 10KB
  36. ~Get Your Files Here !/3. Hardware exploitation of IoT devices/1. UART exploitation-en_US.srt 7KB
  37. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/2. Help tools for Web Application VAPT-en_US.srt 6KB
  38. ~Get Your Files Here !/4. Radio protocols exploitation of IoT devices/2. Replay attacks and countermeasures-en_US.srt 6KB
  39. ~Get Your Files Here !/1. Introduction to IoT Security/1. IoT Security Standards and Guidelines-en_US.srt 6KB
  40. ~Get Your Files Here !/3. Hardware exploitation of IoT devices/2. I2C exploitation-en_US.srt 6KB
  41. ~Get Your Files Here !/2. VAPT methodology for IoT/4. Threat modeling-en_US.srt 5KB
  42. ~Get Your Files Here !/4. Radio protocols exploitation of IoT devices/1. Frequency ranges used by IoT radio protocols and SDR tools-en_US.srt 5KB
  43. ~Get Your Files Here !/3. Hardware exploitation of IoT devices/5. Firmware extraction and analysis-en_US.srt 5KB
  44. ~Get Your Files Here !/3. Hardware exploitation of IoT devices/3. SPI exploitation-en_US.srt 4KB
  45. ~Get Your Files Here !/2. VAPT methodology for IoT/1. Typical attacks to IoT-en_US.srt 4KB
  46. ~Get Your Files Here !/3. Hardware exploitation of IoT devices/4. JTAG exploitation-en_US.srt 4KB
  47. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/16. XXE (XML External Entities) Attack Lab-en_US.srt 4KB
  48. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/11. Unvalidated File Upload attack Lab-en_US.srt 4KB
  49. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/9. OS command Inject attack Lab-en_US.srt 4KB
  50. ~Get Your Files Here !/2. VAPT methodology for IoT/3. Risk analysis-en_US.srt 3KB
  51. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/13. Local and Remote File Inclusion attacks Lab-en_US.srt 3KB
  52. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/7. SQL Injection attack Lab-en_US.srt 3KB
  53. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/4. XSS attack-en_US.srt 3KB
  54. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/5. XSS attack Lab-en_US.srt 3KB
  55. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/6. SQL Injection attack-en_US.srt 3KB
  56. ~Get Your Files Here !/2. VAPT methodology for IoT/2. IoT Vulnerability Assessment and PenTest phases-en_US.srt 3KB
  57. ~Get Your Files Here !/1. Introduction to IoT Security/2. Architecture of an IoT system-en_US.srt 3KB
  58. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/3. Input validation-en_US.srt 2KB
  59. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/8. OS command Inject attack-en_US.srt 2KB
  60. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/12. Local and Remote File Inclusion attacks-en_US.srt 2KB
  61. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/15. XXE (XML External Entities) attack-en_US.srt 2KB
  62. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/14. Insecure Deserialization attack-en_US.srt 2KB
  63. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/1. OWASP Web Security Testing Guide-en_US.srt 1KB
  64. ~Get Your Files Here !/5. CloudWeb exploitation of IoT infrastructure/10. Unvalidated File Upload attack-en_US.srt 979B
  65. ~Get Your Files Here !/Bonus Resources.txt 357B
  66. Get Bonus Downloads Here.url 183B