[] Hack-proofing Your Web Applications 收录时间:2018-02-24 22:28:53 文件大小:660MB 下载次数:107 最近下载:2020-12-07 09:50:20 磁力链接: magnet:?xt=urn:btih:0f4f1f9fdbec3bed9fafafe7e653bcab43a3a85f 立即下载 复制链接 文件列表 1. SQL Injection/03. Demo - Form based SQL Injection 1.wmv 34MB 2. Information Leakage/07. How do you prevent Information Leakage.wmv 27MB 8. Session Management and Hijacking/10. Custom session id managers.wmv 27MB 6. Cross-Site Request Forgery (CSRF)/08. Demo - Web Forms One Click Attack - Forge user interaction.wmv 18MB 8. Session Management and Hijacking/03. Session Management Demo.wmv 15MB 3. Cross-Site Scripting (XSS)/17. Don't turn off Request Validation.wmv 14MB 3. Cross-Site Scripting (XSS)/07. Demo - DOM Based XSS.wmv 14MB 3. Cross-Site Scripting (XSS)/09. Demo - Dangling Markup-Scriptless Attacks.wmv 14MB 1. SQL Injection/10. Basic Dynamic Query Ideas.wmv 13MB 8. Session Management and Hijacking/05. Demo - stealing a session.wmv 13MB 6. Cross-Site Request Forgery (CSRF)/10. Web Forms CSRF Prevention.wmv 13MB 3. Cross-Site Scripting (XSS)/14. Demo (Prevention)- Content Security Policy.wmv 13MB 6. Cross-Site Request Forgery (CSRF)/04. Demo - Exploit using email image src.wmv 12MB 6. Cross-Site Request Forgery (CSRF)/11. MVC CSRF Prevention.wmv 12MB 7. Denial of Service/04. Demo - Browser based distributed denial of service.wmv 12MB 4. Parameter Tampering/04. MVC Parameter Tampering.wmv 11MB 3. Cross-Site Scripting (XSS)/05. Demo - Persistent XSS Attack.wmv 11MB 3. Cross-Site Scripting (XSS)/21. Demo (Fix) - Fixing DOM based attacks.wmv 11MB 8. Session Management and Hijacking/02. ASP.NET Session Id Management Background.wmv 10MB 5. Encryption and Hashing/11. Installing SSL on your development box.wmv 10MB 1. SQL Injection/07. Additional Protections.wmv 10MB 6. Cross-Site Request Forgery (CSRF)/07. POSTs protect me, don't they.wmv 10MB 4. Parameter Tampering/05. Web Forms Parameter Tampering.wmv 10MB 3. Cross-Site Scripting (XSS)/19. Demo (Fix) - Fixing Web Forms Repeater.wmv 9MB 5. Encryption and Hashing/18. Choosing the right approaches.wmv 9MB 8. Session Management and Hijacking/07. Syncing Forms authentication timeouts and session timeouts.wmv 9MB 1. SQL Injection/08. Problematic Fixes - Blacklisting Routines.wmv 8MB 3. Cross-Site Scripting (XSS)/18. Know your encoding options.wmv 8MB 3. Cross-Site Scripting (XSS)/08. Demo - Data URI - Link Hijack.wmv 8MB 5. Encryption and Hashing/02. Why should I encrypt.wmv 8MB 7. Denial of Service/05. Demo - Slow page = easy target.wmv 8MB 1. SQL Injection/09. Problematic Fixes - SQL Routines and SQL Truncation.wmv 8MB 1. SQL Injection/11. Using an ORM.wmv 8MB 7. Denial of Service/02. How is DoS exploited.wmv 7MB 4. Parameter Tampering/10. Validate your data.wmv 7MB 5. Encryption and Hashing/06. How to encrypt - application code.wmv 7MB 5. Encryption and Hashing/16. Demo - Hash brute force attack (even with a salt).wmv 7MB 1. SQL Injection/02. What is SQL Injection.wmv 7MB 5. Encryption and Hashing/07. How to encrypt - configuration settings.wmv 7MB 1. SQL Injection/04. Demo - Form based SQL Injection 2.wmv 6MB 3. Cross-Site Scripting (XSS)/15. Problems with blacklists-character filtering.wmv 6MB 4. Parameter Tampering/07. Preventing tampering in MVC.wmv 6MB 8. Session Management and Hijacking/08. Preventing - Removing the session cookie on login-logout.wmv 6MB 3. Cross-Site Scripting (XSS)/16. How do you prevent XSS (last but not least).wmv 6MB 5. Encryption and Hashing/04. SQL - Encrypt by passphrase.wmv 6MB 4. Parameter Tampering/11. A few minor words of caution.wmv 6MB 5. Encryption and Hashing/08. Forcing SSL - MVC.wmv 6MB 3. Cross-Site Scripting (XSS)/04. Demo - Reflected XSS Attack.wmv 5MB 1. SQL Injection/05. How do you prevent SQL Injection.wmv 5MB 2. Information Leakage/04. Demo - Web App Basic Information Leakage.wmv 5MB 1. SQL Injection/06. Demo - SQL Permissions Auditor Tool.wmv 5MB 3. Cross-Site Scripting (XSS)/02. What is XSS.wmv 5MB 3. Cross-Site Scripting (XSS)/06. Demo - Older Style IE6 Content Type Sniffing Attack.wmv 5MB 4. Parameter Tampering/12. Summary.wmv 5MB 3. Cross-Site Scripting (XSS)/10. How do you prevent XSS.wmv 5MB 5. Encryption and Hashing/05. SQL - Encrypt by certificate.wmv 5MB 7. Denial of Service/03. Demo - Affecting the victim's browser.wmv 4MB 6. Cross-Site Request Forgery (CSRF)/03. How is CSRF exploited.wmv 4MB 6. Cross-Site Request Forgery (CSRF)/06. Demo - CSRF from XSS.wmv 4MB 5. Encryption and Hashing/15. Demo - Basic hash with salt.wmv 4MB 5. Encryption and Hashing/13. How are hashes attacked.wmv 4MB 3. Cross-Site Scripting (XSS)/12. Demo (Prevention)- AntiXss GetSafeHtmlFragment().wmv 4MB 2. Information Leakage/03. How is it information gathered.wmv 4MB 6. Cross-Site Request Forgery (CSRF)/09. How do you prevent CSRF.wmv 4MB 4. Parameter Tampering/06. EventValidation issues with client side script.wmv 4MB 3. Cross-Site Scripting (XSS)/22. Tools.wmv 4MB 3. Cross-Site Scripting (XSS)/23. Summary.wmv 4MB 6. Cross-Site Request Forgery (CSRF)/12. Summary.wmv 3MB 7. Denial of Service/06. Preventing DoS.wmv 3MB 2. Information Leakage/06. Demo - Information Leakage by Ajax.wmv 3MB 4. Parameter Tampering/09. Preventions - Data Annotations.wmv 3MB 3. Cross-Site Scripting (XSS)/20. Demo (Fix) - Fixing Scriptless-Dangling HTML.wmv 3MB 4. Parameter Tampering/08. Preventions - Regular Expressions.wmv 3MB 5. Encryption and Hashing/10. Forcing SSL - Additional Information.wmv 3MB 5. Encryption and Hashing/19. Membership provider support.wmv 3MB 3. Cross-Site Scripting (XSS)/13. Demo (Prevention)- Specifying UTF-8 Encoding.wmv 3MB 6. Cross-Site Request Forgery (CSRF)/05. Demo - Repeatability is the key.wmv 2MB 5. Encryption and Hashing/17. Tool Demo - Hashcat.wmv 2MB 5. Encryption and Hashing/12. About Hashing.wmv 2MB 5. Encryption and Hashing/14. What's a salt.wmv 2MB 8. Session Management and Hijacking/11. Additional Information.wmv 2MB 4. Parameter Tampering/03. How is it exploited.wmv 2MB 8. Session Management and Hijacking/09. Preventing - Avoid cookieless sessions.wmv 2MB 5. Encryption and Hashing/09. Forcing SSL - Web Forms.wmv 2MB 5. Encryption and Hashing/20. But I need my lost password functionality.wmv 2MB 3. Cross-Site Scripting (XSS)/11. How do you prevent XSS (page 2).wmv 2MB 5. Encryption and Hashing/03. How to encrypt - database side.wmv 2MB 2. Information Leakage/02. What is information leakage.wmv 2MB 8. Session Management and Hijacking/04. How can sessions be attacked.wmv 2MB 6. Cross-Site Request Forgery (CSRF)/02. What is CSRF.wmv 2MB 8. Session Management and Hijacking/06. Preventing Session Attacks.wmv 1MB 4. Parameter Tampering/13. Additional Information References.wmv 1MB 2. Information Leakage/05. Demo - Information Leakage from error page.wmv 1MB 3. Cross-Site Scripting (XSS)/03. How is XSS exploited.wmv 1MB 5. Encryption and Hashing/21. Additional Information.wmv 992KB 7. Denial of Service/07. Additional Information References.wmv 992KB 4. Parameter Tampering/02. What is parameter tampering.wmv 957KB 1. SQL Injection/12. Additional Information References.wmv 887KB 3. Cross-Site Scripting (XSS)/24. Additional Information References.wmv 817KB 2. Information Leakage/08. Additional Reading.wmv 770KB 5. Encryption and Hashing/01. Introduction.wmv 286KB 2. Information Leakage/01. Introduction.wmv 274KB 8. Session Management and Hijacking/01. Introduction.wmv 262KB 4. Parameter Tampering/01. Introduction.wmv 251KB 6. Cross-Site Request Forgery (CSRF)/01. Introduction.wmv 251KB 3. Cross-Site Scripting (XSS)/01. Introduction.wmv 251KB 1. SQL Injection/01. Introduction.wmv 239KB 7. Denial of Service/01. Introduction.wmv 216KB