FileMood

Download Hack Yourself First - How to go on the Cyber-Offense

Hack Yourself First How to go on the Cyber Offense

Name

Hack Yourself First - How to go on the Cyber-Offense

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

1.1 GB

Total Files

161

Hash

585F018CF297665BB8B9C7CD35B2AA32A28398A3

/02.Transport Layer Protection/

06.How loading login forms over HTTP is risky.wmv

45.2 MB

05.The risk of sending cookies over insecure connections.wmv

28.2 MB

07.Exploiting mixed-mode content.wmv

21.5 MB

08.The HSTS header.wmv

15.9 MB

04.Protecting sensitive data in transit.wmv

12.5 MB

03.Understanding a man in the middle attack.wmv

6.6 MB

09.Summary.wmv

4.8 MB

02.The three objectives of transport layer protection.wmv

4.4 MB

01.Introduction.wmv

2.4 MB

06.How loading login forms over HTTP is risky.srt

25.0 KB

05.The risk of sending cookies over insecure connections.srt

16.8 KB

07.Exploiting mixed-mode content.srt

13.6 KB

08.The HSTS header.srt

9.1 KB

04.Protecting sensitive data in transit.srt

7.9 KB

03.Understanding a man in the middle attack.srt

5.1 KB

09.Summary.srt

4.0 KB

02.The three objectives of transport layer protection.srt

4.0 KB

01.Introduction.srt

1.8 KB

/

hack-yourself-first.zip

35.6 MB

/06.Parameter Tampering/

05.Testing for missing server side validation.wmv

33.1 MB

09.Fuzz testing.wmv

29.5 MB

08.HTTP verb tampering.wmv

21.5 MB

03.Capturing requests and manipulating parameters.wmv

20.9 MB

02.Identifying untrusted data in HTTP request parameters.wmv

18.8 MB

07.Executing a mass assignment attack.wmv

17.1 MB

04.Manipulating application logic via parameters.wmv

15.4 MB

10.Summary.wmv

8.5 MB

06.Understanding model binding.wmv

5.3 MB

01.Introduction.wmv

3.4 MB

05.Testing for missing server side validation.srt

21.1 KB

09.Fuzz testing.srt

20.2 KB

02.Identifying untrusted data in HTTP request parameters.srt

14.7 KB

08.HTTP verb tampering.srt

14.3 KB

03.Capturing requests and manipulating parameters.srt

12.8 KB

07.Executing a mass assignment attack.srt

12.0 KB

04.Manipulating application logic via parameters.srt

9.6 KB

10.Summary.srt

7.1 KB

06.Understanding model binding.srt

5.0 KB

01.Introduction.srt

2.9 KB

/08.Cross Site Attacks/

06.Mounting a clickjacking attack.wmv

31.0 MB

05.Testing cross site request forgery against APIs.wmv

27.3 MB

04.The role of anti-forgery tokens.wmv

22.7 MB

03.Testing for a cross site request forgery risk.wmv

14.9 MB

02.Understanding cross site attacks.wmv

8.1 MB

07.Summary.wmv

5.9 MB

01.Introduction.wmv

2.3 MB

06.Mounting a clickjacking attack.srt

20.5 KB

04.The role of anti-forgery tokens.srt

16.5 KB

05.Testing cross site request forgery against APIs.srt

15.5 KB

03.Testing for a cross site request forgery risk.srt

10.8 KB

02.Understanding cross site attacks.srt

6.4 KB

07.Summary.srt

5.0 KB

01.Introduction.srt

2.0 KB

/07.SQL Injection/

07.Blind SQL injection.wmv

27.8 MB

04.Discovering database structure via injection.wmv

23.9 MB

02.Understanding SQL injection.wmv

14.9 MB

03.Testing for injection risks.wmv

14.6 MB

08.Secure app patterns.wmv

13.8 MB

06.Automating attacks with Havij.wmv

13.6 MB

09.Summary.wmv

9.0 MB

05.Harvesting data via injection.wmv

8.6 MB

01.Outline.wmv

3.0 MB

07.Blind SQL injection.srt

22.0 KB

04.Discovering database structure via injection.srt

18.0 KB

02.Understanding SQL injection.srt

13.4 KB

08.Secure app patterns.srt

11.6 KB

03.Testing for injection risks.srt

10.9 KB

06.Automating attacks with Havij.srt

9.9 KB

09.Summary.srt

7.7 KB

05.Harvesting data via injection.srt

5.9 KB

01.Outline.srt

2.8 KB

/04.Cookies/

05.Restricting cookie access by path.wmv

24.2 MB

03.Understanding HttpOnly cookies.wmv

20.2 MB

04.Understanding secure cookies.wmv

17.6 MB

06.Reducing risk with cookie expiration.wmv

13.0 MB

02.Cookies 101.wmv

10.7 MB

07.Using session cookies to further reduce risk.wmv

9.3 MB

08.Summary.wmv

4.3 MB

01.Introduction.wmv

1.8 MB

05.Restricting cookie access by path.srt

13.5 KB

02.Cookies 101.srt

9.7 KB

06.Reducing risk with cookie expiration.srt

8.8 KB

04.Understanding secure cookies.srt

8.8 KB

03.Understanding HttpOnly cookies.srt

7.0 KB

07.Using session cookies to further reduce risk.srt

5.8 KB

08.Summary.srt

3.3 KB

01.Introduction.srt

1.7 KB

/03.Cross Site Scripting (XSS)/

07.Testing for the risk of persistent XSS.wmv

24.0 MB

08.The X-XSS-Protection header.wmv

17.3 MB

04.Understanding XSS and output encoding.wmv

15.8 MB

06.Delivering a payload via reflected XSS.wmv

15.5 MB

02.Understanding untrusted data and sanitisation.wmv

10.3 MB

05.Identifying the use of output encoding.wmv

9.7 MB

03.Establishing input sanitisation practices.wmv

8.2 MB

09.Summary.wmv

5.1 MB

01.Introduction.wmv

2.7 MB

04.Understanding XSS and output encoding.srt

13.9 KB

06.Delivering a payload via reflected XSS.srt

13.4 KB

07.Testing for the risk of persistent XSS.srt

10.6 KB

02.Understanding untrusted data and sanitisation.srt

9.9 KB

08.The X-XSS-Protection header.srt

8.9 KB

05.Identifying the use of output encoding.srt

7.3 KB

03.Establishing input sanitisation practices.srt

6.4 KB

09.Summary.srt

4.1 KB

01.Introduction.srt

2.2 KB

/09.Account Management/

02.Understanding password strength and attack vectors.wmv

22.5 MB

08.Establishing insecure password storage.wmv

17.5 MB

09.Testing for risks in the 'remember me' feature.wmv

14.0 MB

11.Testing for authentication brute force.wmv

13.6 MB

05.Account enumeration.wmv

12.8 MB

03.Limiting characters in passwords.wmv

9.6 MB

12.Summary.wmv

8.3 MB

10.Re-authenticating before key actions.wmv

6.5 MB

07.Correctly securing the reset processes.wmv

5.4 MB

04.Emailing credentials on account creation.wmv

3.9 MB

01.Introduction.wmv

3.8 MB

06.Denial of service via password reset.wmv

3.7 MB

02.Understanding password strength and attack vectors.srt

15.9 KB

08.Establishing insecure password storage.srt

11.5 KB

11.Testing for authentication brute force.srt

11.2 KB

05.Account enumeration.srt

11.0 KB

03.Limiting characters in passwords.srt

8.2 KB

09.Testing for risks in the 'remember me' feature.srt

7.6 KB

12.Summary.srt

6.7 KB

10.Re-authenticating before key actions.srt

5.9 KB

07.Correctly securing the reset processes.srt

4.7 KB

06.Denial of service via password reset.srt

3.5 KB

01.Introduction.srt

3.3 KB

04.Emailing credentials on account creation.srt

3.0 KB

/05.Internal Implementation Disclosure/

09.Lack of access controls on diagnostic data.wmv

20.9 MB

04.Locating at-risk websites.wmv

20.8 MB

08.Internal error message leakage.wmv

18.9 MB

02.How an attacker builds a website risk profile.wmv

16.4 MB

05.HTTP fingerprinting of servers.wmv

14.8 MB

03.Server response header disclosure.wmv

12.2 MB

07.The risks in HTML source.wmv

7.9 MB

06.Disclosure via robots.txt.wmv

7.8 MB

10.Summary.wmv

6.5 MB

01.Introduction.wmv

3.1 MB

09.Lack of access controls on diagnostic data.srt

14.5 KB

08.Internal error message leakage.srt

14.4 KB

05.HTTP fingerprinting of servers.srt

12.2 KB

02.How an attacker builds a website risk profile.srt

10.0 KB

03.Server response header disclosure.srt

9.2 KB

04.Locating at-risk websites.srt

9.2 KB

06.Disclosure via robots.txt.srt

7.0 KB

07.The risks in HTML source.srt

6.1 KB

10.Summary.srt

5.2 KB

01.Introduction.srt

2.7 KB

/01.Introduction/

03.Introducing a vulnerable website – Supercar Showdown.wmv

14.6 MB

04.Using Chrome's developer tools.wmv

13.3 MB

06.Modifying requests and responses in Fiddler.wmv

9.2 MB

05.Monitoring and composing requests with Fiddler.wmv

8.8 MB

02.Why hack yourself first.wmv

7.5 MB

01.About the course.wmv

3.4 MB

04.Using Chrome's developer tools.srt

7.5 KB

03.Introducing a vulnerable website – Supercar Showdown.srt

7.0 KB

05.Monitoring and composing requests with Fiddler.srt

6.5 KB

02.Why hack yourself first.srt

5.9 KB

06.Modifying requests and responses in Fiddler.srt

4.5 KB

01.About the course.srt

2.8 KB

 

Total files 161


Copyright © 2025 FileMood.com