FileMood

Download OWASP Top 10 Web Application Security Risks for ASP.NET

OWASP Top 10 Web Application Security Risks for ASP NET

Name

OWASP Top 10 Web Application Security Risks for ASP.NET

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

2.2 GB

Total Files

122

Hash

7576A9AC1ECD4659D8AFEFDF480D37F20B4789D8

/

Exercide Files.zip

378.5 MB

/3. Cross Site Scripting (XSS)/

11 - Demo - ASP NET reequest validation.mp4

66.7 MB

7 - Demo - Implementing output encoding.mp4

26.8 MB

4 - Risk in practice - My Space and Samy.mp4

25.7 MB

12 - Demo - Reflective versus persistent XSS.mp4

18.3 MB

3 - Demo - Anatomy of an attacker.mp4

17.5 MB

13 - Demo - Native browser defences.mp4

14.3 MB

8 - Demo - Output encoding in web forms.mp4

13.0 MB

10 - Demo - Whitelisting allowable values.mp4

11.9 MB

15 - Summary.mp4

10.6 MB

6 - Output encoding concepts.mp4

9.5 MB

9 - Demo - Output encoding in MVC.mp4

6.6 MB

14 - Demo - Payload obfuscation.mp4

4.2 MB

2 - OWASP overview and risk rating.mp4

3.9 MB

1 - Introduction.mp4

2.9 MB

5 - Understanding XSS.mp4

2.8 MB

/8. Insecure Cryptographic Storage/

3 - Demo - Anatomy of an attack.mp4

63.0 MB

6 - Understanding salt and brute force attacks.mp4

35.7 MB

7 - Slowing down hashes with new Membership Provider.mp4

27.8 MB

5 - Understanding password storage and hashing.mp4

26.3 MB

11 - Demo - Symmetric encryption using DPAPI.mp4

24.6 MB

4 - Risk in practice - ABC passwords.mp4

18.9 MB

8 - Other stronger hashing implemenetations.mp4

15.7 MB

12 - Whats not cryptographic.mp4

15.3 MB

9 - Things to consider when choosing a hashing implementations.mp4

14.7 MB

13 - Summary.mp4

12.6 MB

10 - Understanding symmetric and asymmetric encryption.mp4

11.3 MB

2 - OWASP overview and risk rating.mp4

6.7 MB

1 - Introduction.mp4

2.8 MB

/5. Insecure Direct Object References/

8 - Demo - Building an indirect reference map.mp4

44.9 MB

6 - Demo - Implementing access controls.mp4

21.0 MB

3 - Demo - Anatomy of an attack.mp4

17.3 MB

7 - Understanding indirect reference maps.mp4

11.1 MB

4 - Risk in practice - Citibank.mp4

11.0 MB

5 - Understanding direct object references.mp4

10.9 MB

9 - Obfuscation via random surrogate keys.mp4

4.5 MB

10 - Summary.mp4

3.8 MB

2 - OWASP overview and risk rating.mp4

3.5 MB

1 - Introduction.mp4

1.4 MB

/7. Security Misconfiguration/

5 - Demo - Correctly configuring custom errors.mp4

41.6 MB

9 - Demo - Using config transforms to apply secure configurations.mp4

34.2 MB

8 - Demo - Encrypting sensitive parts of the web-config.mp4

30.2 MB

3 - Demo - Anatomy of an attack.mp4

27.1 MB

7 - Demo - Keeping frameworks currrent with NuGet.mp4

23.3 MB

6 - Demo - Securing web forms tracing.mp4

21.8 MB

4 - Risk in practice - ELMAH.mp4

17.9 MB

10 - Demo - Enabling retail mode on the server.mp4

15.1 MB

11 - Summary.mp4

9.0 MB

2 - OWASP overview and risk rating.mp4

6.4 MB

1 - Introduction.mp4

2.3 MB

/10. Insufficient Transport Layer Protection/

3 - Demo - Anatomy of an attackmp4.mp4

40.6 MB

5 - Demo - Understanding secure cookies and froms authentication.mp4

39.3 MB

6 - Demo - Securing other cookies in ASP NET.mp4

38.2 MB

4 - Risk in practice - Tunisian ISPs.mp4

30.2 MB

9 - Demo - Mixed mode HTTPS.mp4

22.2 MB

7 - Demo - Forcing web forms to use HTTPS.mp4

20.5 MB

12 - Other HTTPS considerations.mp4

17.5 MB

11 - Other insufficient HTTPS patterns.mp4

17.2 MB

13 - Summary.mp4

15.7 MB

10 - HTTP strict transport security.mp4

13.9 MB

8 - Demo - Requiring HTTPS on MVC controllers.mp4

12.4 MB

2 - OWASP overview and risk rating.mp4

10.5 MB

1 - Introduction.mp4

3.9 MB

/2. Injection/

3 - Demo - Anatomy of an attack.mp4

37.1 MB

12 - Demo - Injection through stored procedures.mp4

25.8 MB

10 - Demo - Whitelisting untrusted data.mp4

20.5 MB

13 - Demo - Injection automation with Havij.mp4

18.8 MB

7 - Demo - The principle of least privilege.mp4

18.6 MB

11 - Demo - Entity Framework's SQL parameterisation.mp4

16.9 MB

8 - Demo - Inline SQL parameterisation.mp4

16.3 MB

9 - Demo - Stored procedure parameterisation.mp4

10.5 MB

14 - Summary.mp4

7.6 MB

2 - OWASP overview and risk rating.mp4

6.2 MB

4 - Risk in practice - LulzSec and Sony.mp4

5.2 MB

6 - Defining untrusted data.mp4

5.1 MB

1 - Introduction.mp4

3.1 MB

5 - Understanding SQL Injection.mp4

2.2 MB

/6. Cross Site Request Forgery (CSRF)/

5 - What make a CSRF attack possible.mp4

34.8 MB

7 - Demo - Implementing an anti-frogery token in MVC.mp4

19.4 MB

8 - Demo - Web forms approach to anti-frogery tokens.mp4

18.3 MB

4 - Risk in practice - Compromised Brazillian modems.mp4

18.3 MB

3 - Demo - Anatomy of an attack.mp4

15.0 MB

9 - CSRF fallacies and browser defences.mp4

9.0 MB

10 - Summary.mp4

7.1 MB

6 - Understanding anti-frogery tokens.mp4

6.7 MB

2 - OWASP overview and risk rating.mp4

6.6 MB

1 - Introduction.mp4

2.2 MB

/9. Failure to Restrict URL Access/

7 - Demo - Role based authorisation with the ASP NET Role Provider.mp4

30.6 MB

4 - Risk in practice - Apple AT&T leak.mp4

22.1 MB

6 - Demo - Access controls in ASP NET part 2 - The authorize attribute.mp4

22.1 MB

5 - Demo - Access controls in ASP NET part 1 - web-config locations.mp4

20.6 MB

8 - Other access controls risk and misconceptions.mp4

19.3 MB

9 - Summary.mp4

12.9 MB

2 - OWASP overview and risk rating.mp4

6.3 MB

3 - Demo - Anatomy of an attack.mp4

6.2 MB

1 - Introduction.mp4

1.8 MB

/11. Unvalidated Redirects and Forwards/

3 - Demo - Anatomy of an attack.mp4

19.7 MB

7 - Demo - implementing referrer checking.mp4

19.3 MB

6 - Demo - implementing a whitelist.mp4

17.6 MB

4 - Risk in practice - US government websites.mp4

14.7 MB

5 - Understanding the value of unvalidated redirects to attackers.mp4

12.7 MB

2 - OWASP overview and risk rating.mp4

10.3 MB

8 - Other issues with the unvalidated redirect riskmp4.mp4

8.5 MB

9 - Summary.mp4

6.7 MB

1 - Introduction.mp4

1.9 MB

/4. Broken Authentication and Session Management/

8 - Demo - Leveraging ASP NET membership provider for authentication.mp4

18.3 MB

7 - Demo - Securely configuring session persistence.mp4

10.4 MB

11 - Other broken authentication patterns.mp4

7.1 MB

4 - Risk in practice - Apples's session fixation.mp4

6.6 MB

12 - Summary.mp4

6.0 MB

6 - The risk of session persistence in the URL versus cookies.mp4

5.8 MB

10 - Siding versus fixed forms timeout.mp4

5.6 MB

9 - Customising session and forms timeouts to minimise risk windows.mp4

5.4 MB

3 - Demo - Anatomy of an attack.mp4

4.8 MB

2 - OWASP overview and risk rating.mp4

3.8 MB

5 - Persisting state in a stateless protocol.mp4

2.1 MB

1 - Introduction.mp4

1.6 MB

/1. Introduction/

3 - Who's doing the hacking.mp4

15.1 MB

4 - OWASP and the Top 10.mp4

14.9 MB

5 - Applying security in depth.mp4

8.5 MB

2 - Who's getting hacked.mp4

7.1 MB

1 - Introduction.mp4

1.4 MB

 

Total files 122


Copyright © 2025 FileMood.com