FileMood

Download CBR2466

CBR2466

Name

CBR2466

 DOWNLOAD Copy Link

Total Size

3.3 GB

Total Files

96

Hash

A9C0F9884AF4B921381CC8F3A5B0A99BB7CEF6A0

/

0 Introduction -- 0 Part 1 Intro.mp4

32.3 MB

0 Introduction -- 1 Part 2 Lab Setup.mp4

37.7 MB

0 Introduction -- 2 Part 3 BurpSuite.mp4

90.7 MB

0 Introduction -- 3 Part 4 Mutillidae.mp4

25.2 MB

1 Module 01 OWASP Top 10 A1 Injection -- 0 Part 1 Intro.mp4

11.1 MB

1 Module 01 OWASP Top 10 A1 Injection -- 1 Part 2 Explanations.mp4

58.3 MB

1 Module 01 OWASP Top 10 A1 Injection -- 2 Part 3 SQL Injection Demo.mp4

21.4 MB

1 Module 01 OWASP Top 10 A1 Injection -- 3 Part 4 Command Injection Demo.mp4

17.9 MB

1 Module 01 OWASP Top 10 A1 Injection -- 4 Part 5 JSON Injection Demo.mp4

39.4 MB

1 Module 01 OWASP Top 10 A1 Injection -- 5 Part 6 Defenses.mp4

29.2 MB

1 Module 01 OWASP Top 10 A1 Injection -- 6 Part 7 Lab Solution.mp4

26.8 MB

10 Module 10 OWASP Top 10 A10 Unvalidated Redirects and Forwards -- 0 Part 1 Intro.mp4

8.5 MB

10 Module 10 OWASP Top 10 A10 Unvalidated Redirects and Forwards -- 1 Part 2 Explanations.mp4

22.6 MB

10 Module 10 OWASP Top 10 A10 Unvalidated Redirects and Forwards -- 2 Part 3 Unvalidated URLs Demo.mp4

37.8 MB

10 Module 10 OWASP Top 10 A10 Unvalidated Redirects and Forwards -- 3 Part 4 Defenses.mp4

24.3 MB

10 Module 10 OWASP Top 10 A10 Unvalidated Redirects and Forwards -- 4 Part 5 JS redirect Lab.mp4

27.5 MB

11 Module 11 CWE SANS Top 25 Buffer Overflows -- 0 Part 1 Intro.mp4

9.1 MB

11 Module 11 CWE SANS Top 25 Buffer Overflows -- 1 Part 2 Explanations.mp4

49.7 MB

11 Module 11 CWE SANS Top 25 Buffer Overflows -- 2 Part 3 Classic BufferOverflow Demo.mp4

38.6 MB

11 Module 11 CWE SANS Top 25 Buffer Overflows -- 3 Part 4 Defenses.mp4

20.7 MB

11 Module 11 CWE SANS Top 25 Buffer Overflows -- 4 Part 5 WebGoat BO OffByOne Lab.mp4

46.9 MB

12 Module 12 CWE SANS Top 25 Insecure Interaction Between Components -- 0 Part 1 Intro.mp4

9.7 MB

12 Module 12 CWE SANS Top 25 Insecure Interaction Between Components -- 1 Part 2 Explanations.mp4

42.1 MB

12 Module 12 CWE SANS Top 25 Insecure Interaction Between Components -- 2 Part 3 FileUpload Demo.mp4

25.9 MB

12 Module 12 CWE SANS Top 25 Insecure Interaction Between Components -- 3 Part 4 Defenses.mp4

35.1 MB

12 Module 12 CWE SANS Top 25 Insecure Interaction Between Components -- 4 Part 5 WebGoat FileUpload Lab.mp4

36.4 MB

13 Module 13 CWE SANS Top 25 Risky Resource Management -- 0 Part 1 Intro.mp4

9.8 MB

13 Module 13 CWE SANS Top 25 Risky Resource Management -- 1 Part 2 Explanations.mp4

35.8 MB

13 Module 13 CWE SANS Top 25 Risky Resource Management -- 2 Part 3 Risky Resource Mgmt Demo.mp4

19.0 MB

13 Module 13 CWE SANS Top 25 Risky Resource Management -- 3 Part 4 Defenses.mp4

59.3 MB

13 Module 13 CWE SANS Top 25 Risky Resource Management -- 4 Part 5 Lab Defenses.mp4

33.1 MB

14 Module 14 CWE SANS Top 25 Porous Defenses -- 0 Part 1 Intro.mp4

9.0 MB

14 Module 14 CWE SANS Top 25 Porous Defenses -- 1 Part 2 Explanations.mp4

60.5 MB

14 Module 14 CWE SANS Top 25 Porous Defenses -- 2 Part 3 JS Validation Bypass Demo.mp4

13.6 MB

14 Module 14 CWE SANS Top 25 Porous Defenses -- 3 Part 4 Defenses.mp4

27.1 MB

14 Module 14 CWE SANS Top 25 Porous Defenses -- 4 Part 5 HTTP Response Splitting Lab.mp4

50.3 MB

15 Module 15 Honorable Mentions -- 0 Part 1 Intro.mp4

8.8 MB

15 Module 15 Honorable Mentions -- 1 Part 2 Explanations.mp4

61.1 MB

15 Module 15 Honorable Mentions -- 2 Part 3 Lab.mp4

32.5 MB

16 Module 16 Active Defenses -- 0 Part 1 Intro.mp4

8.9 MB

16 Module 16 Active Defenses -- 1 Part 2 Explanations.mp4

35.1 MB

17 Module 17 Threat Modeling -- 0 Part 1 Intro.mp4

10.7 MB

17 Module 17 Threat Modeling -- 1 Part 2 Explanations.mp4

109.5 MB

17 Module 17 Threat Modeling -- 2 Part 3 Card Game Demo.mp4

72.7 MB

2 Module 02 OWASP Top 10 A2 Broken Authentication and Session Management -- 0 Part 1 Intro.mp4

9.8 MB

2 Module 02 OWASP Top 10 A2 Broken Authentication and Session Management -- 1 Part 2 Explanations.mp4

61.3 MB

2 Module 02 OWASP Top 10 A2 Broken Authentication and Session Management -- 2 Part 3 CookieManipulation Demo.mp4

22.6 MB

2 Module 02 OWASP Top 10 A2 Broken Authentication and Session Management -- 3 Part 4 Username Enum Demo.mp4

71.6 MB

2 Module 02 OWASP Top 10 A2 Broken Authentication and Session Management -- 4 Part 5 BruteForce Demo.mp4

33.5 MB

2 Module 02 OWASP Top 10 A2 Broken Authentication and Session Management -- 5 Part 6 Defenses.mp4

26.4 MB

2 Module 02 OWASP Top 10 A2 Broken Authentication and Session Management -- 6 Part 7 Lab Solution 1.mp4

19.9 MB

2 Module 02 OWASP Top 10 A2 Broken Authentication and Session Management -- 7 Part 8 Lab Solutions 2.mp4

20.7 MB

2 Module 02 OWASP Top 10 A2 Broken Authentication and Session Management -- 8 Part 9 Lab Solutions 3.mp4

19.7 MB

3 Module 03 OWASP Top 10 A3 Cross-site Scripting -- 0 Part 1 Intro.mp4

9.9 MB

3 Module 03 OWASP Top 10 A3 Cross-site Scripting -- 1 Part 2 Explanations.mp4

47.1 MB

3 Module 03 OWASP Top 10 A3 Cross-site Scripting -- 2 Part 3 Reflected XSS HTML context Demo.mp4

36.7 MB

3 Module 03 OWASP Top 10 A3 Cross-site Scripting -- 3 Part 4 Reflected XSS JS context Demo.mp4

74.9 MB

3 Module 03 OWASP Top 10 A3 Cross-site Scripting -- 4 Part 5 Stored Demo.mp4

38.8 MB

3 Module 03 OWASP Top 10 A3 Cross-site Scripting -- 5 Part 6 Defenses.mp4

60.7 MB

3 Module 03 OWASP Top 10 A3 Cross-site Scripting -- 6 Part 7 Lab Solutions 1.mp4

34.6 MB

3 Module 03 OWASP Top 10 A3 Cross-site Scripting -- 7 Part 8 Lab Solutions 2.mp4

20.3 MB

4 Module 04 OWASP Top 10 A4 Insecure Direct Object Reference -- 0 Part 1 Intro.mp4

10.4 MB

4 Module 04 OWASP Top 10 A4 Insecure Direct Object Reference -- 1 Part 2 Explanations.mp4

61.8 MB

4 Module 04 OWASP Top 10 A4 Insecure Direct Object Reference -- 2 Part 3 IDOR files tokens Demo.mp4

48.4 MB

4 Module 04 OWASP Top 10 A4 Insecure Direct Object Reference -- 3 Part 4 IDO urls tokens Demo.mp4

28.9 MB

4 Module 04 OWASP Top 10 A4 Insecure Direct Object Reference -- 4 Part 5 Defenses.mp4

38.9 MB

4 Module 04 OWASP Top 10 A4 Insecure Direct Object Reference -- 5 Part 6 Lab Solutions.mp4

21.7 MB

5 Module 05 OWASP Top 10 A5 Security Misconfiguration -- 0 Part 1 Intro.mp4

11.6 MB

5 Module 05 OWASP Top 10 A5 Security Misconfiguration -- 1 Part 2 Explanations.mp4

43.8 MB

5 Module 05 OWASP Top 10 A5 Security Misconfiguration -- 2 Part 3 Dir Demo.mp4

35.2 MB

5 Module 05 OWASP Top 10 A5 Security Misconfiguration -- 3 Part 4 XXE Demo.mp4

29.0 MB

5 Module 05 OWASP Top 10 A5 Security Misconfiguration -- 4 Part 5 User Agent Demo.mp4

60.4 MB

5 Module 05 OWASP Top 10 A5 Security Misconfiguration -- 5 Part 6 Defenses.mp4

43.1 MB

5 Module 05 OWASP Top 10 A5 Security Misconfiguration -- 6 Part 7 Lab Solutions.mp4

15.2 MB

6 Module 06 OWASP Top 10 A6 Sensitive Data Exposure -- 0 Part 1 Intro.mp4

11.2 MB

6 Module 06 OWASP Top 10 A6 Sensitive Data Exposure -- 1 Part 2 Explanations.mp4

48.0 MB

6 Module 06 OWASP Top 10 A6 Sensitive Data Exposure -- 2 Part 3 Comments Demo.mp4

22.8 MB

6 Module 06 OWASP Top 10 A6 Sensitive Data Exposure -- 3 Part 4 HiddenPages Demo.mp4

37.2 MB

6 Module 06 OWASP Top 10 A6 Sensitive Data Exposure -- 4 Part 5 HTMLS Web Storage Demo.mp4

48.6 MB

6 Module 06 OWASP Top 10 A6 Sensitive Data Exposure -- 5 Part 6 Defenses.mp4

54.7 MB

7 Module 07 OWASP Top 10 A7 Missing Function Level Access Control -- 0 Part 1 Intro.mp4

9.0 MB

7 Module 07 OWASP Top 10 A7 Missing Function Level Access Control -- 1 Part 2 Explanations.mp4

64.5 MB

7 Module 07 OWASP Top 10 A7 Missing Function Level Access Control -- 2 Part 3 Role Demo.mp4

25.3 MB

7 Module 07 OWASP Top 10 A7 Missing Function Level Access Control -- 3 Part 4 Defenses.mp4

28.7 MB

7 Module 07 OWASP Top 10 A7 Missing Function Level Access Control -- 4 Part 5 Missing FL AC Lab.mp4

53.1 MB

8 Module 08 OWASP Top 10 A8 Cross-site Request Forgery -- 0 Part 1 Intro.mp4

8.8 MB

8 Module 08 OWASP Top 10 A8 Cross-site Request Forgery -- 1 Part 2 Explanations.mp4

37.1 MB

8 Module 08 OWASP Top 10 A8 Cross-site Request Forgery -- 2 Part 3 CSRF JS Demo.mp4

48.6 MB

8 Module 08 OWASP Top 10 A8 Cross-site Request Forgery -- 3 Part 4 Entropy Demo.mp4

46.5 MB

8 Module 08 OWASP Top 10 A8 Cross-site Request Forgery -- 4 Part 5 CSRF Defenses.mp4

38.6 MB

8 Module 08 OWASP Top 10 A8 Cross-site Request Forgery -- 5 Part 6 CSRF Lab Solution.mp4

45.9 MB

9 Module 09 OWASP Top 10 A9 Using Components with Known Vulns -- 0 Part 1 Intro.mp4

9.3 MB

9 Module 09 OWASP Top 10 A9 Using Components with Known Vulns -- 1 Part 2 Explanations.mp4

28.2 MB

9 Module 09 OWASP Top 10 A9 Using Components with Known Vulns -- 2 Part 3 Libraries & CVSS Demo.mp4

46.3 MB

9 Module 09 OWASP Top 10 A9 Using Components with Known Vulns -- 3 Part 4 Defenses.mp4

22.5 MB

9 Module 09 OWASP Top 10 A9 Using Components with Known Vulns -- 4 Part 5 WebGoat Library CVSS Lab.mp4

45.9 MB

 

Total files 96


Copyright © 2024 FileMood.com