FileMood

Download OWASP Top 10 Web Application Security Risks for ASP.NET

OWASP Top 10 Web Application Security Risks for ASP NET

Name

OWASP Top 10 Web Application Security Risks for ASP.NET

 DOWNLOAD Copy Link

Total Size

914.3 MB

Total Files

121

Hash

D6BEF20BCF3022E03AA58054423851BC02ADBE61

/Module 08 Insecure Cryptographic Storage/

03_Demo Anatomy of an attack.flv

45.6 MB

06_Understanding salt and brute force attacks.flv

17.3 MB

05_Understanding password storage and hashing.flv

15.6 MB

11_Demo Symmetric encryption using DPAPI.flv

13.0 MB

07_Slowing down hashes with the new Membership Provider.flv

11.9 MB

04_Risk in practice ABC passwords.flv

9.6 MB

08_Other stronger hashing implementations.flv

9.3 MB

12_What's not cryptographic.flv

8.6 MB

09_Things to consider when choosing a hashing implementation.flv

8.1 MB

10_Understanding symmetric and asymmetric encryption.flv

5.8 MB

13_Summary.flv

5.4 MB

02_OWASP overview and risk rating.flv

3.4 MB

01_Introduction.flv

1.9 MB

/Module 03 Cross Site Scripting (XSS)/

11_Demo ASP.NET request validation.flv

23.2 MB

07_Demo Implementing output encoding.flv

14.7 MB

04_Risk in practice My Space and Samy.flv

12.8 MB

03_Demo Anatomy of an attack.flv

10.9 MB

08_Demo Output encoding in web forms.flv

9.7 MB

12_Demo Reflective versus persistent XSS.flv

8.8 MB

13_Demo Native browser defences.flv

8.0 MB

06_Output encoding concepts.flv

6.3 MB

10_Demo Whitelisting allowable values.flv

5.5 MB

09_Demo Output encoding in MVC.flv

4.8 MB

15_Summary.flv

4.6 MB

14_Demo Payload obfuscation.flv

3.7 MB

05_Understanding XSS.flv

2.5 MB

02_OWASP overview and risk rating.flv

2.2 MB

01_Introduction.flv

2.0 MB

/Module 05 Insecure Direct Object References/

08_Demo Building an indirect reference map.flv

21.1 MB

06_Demo Implementing access controls.flv

9.0 MB

03_Demo Anatomy of an attack.flv

8.1 MB

05_Understanding direct object references.flv

6.8 MB

07_Understanding indirect reference maps.flv

6.2 MB

04_Risk in practice Citibank.flv

3.1 MB

10_Summary.flv

2.6 MB

09_Obfuscation via random surrogate keys.flv

2.5 MB

02_OWASP overview and risk rating.flv

1.9 MB

01_Introduction.flv

1.2 MB

/Module 10 Insufficient Transport Layer Protection/

03_Demo Anatomy of an attack.flv

20.0 MB

05_Demo Understanding secure cookies and forms authentication.flv

15.7 MB

06_Demo Securing other cookies in ASP.NET.flv

12.5 MB

07_Demo Forcing web forms to use HTTPS.flv

10.7 MB

09_Demo Mixed mode HTTPS.flv

10.3 MB

04_Risk in practice Tunisian ISPs.flv

9.2 MB

12_Other HTTPS considerations.flv

9.2 MB

10_HTTP strict transport security.flv

8.1 MB

11_Other insufficient HTTPS patterns.flv

7.9 MB

13_Summary.flv

6.8 MB

08_Demo Requiring HTTPS on MVC controllers.flv

6.5 MB

02_OWASP overview and risk rating.flv

4.9 MB

01_Introduction.flv

3.0 MB

/Module 07 Security Misconfiguration/

05_Demo Correctly configuring custom errors.flv

17.4 MB

09_Demo Using config transforms to apply secure configurations.flv

11.8 MB

03_Demo Anatomy of an attack.flv

10.5 MB

06_Demo Securing web forms tracing.flv

10.4 MB

10_Demo Enabling retail mode on the server.flv

10.0 MB

08_Demo Encrypting sensitive parts of the web.config.flv

9.5 MB

07_Demo Keeping frameworks current with NuGet.flv

9.0 MB

04_Risk in practice ELMAH.flv

6.1 MB

11_Summary.flv

5.1 MB

02_OWASP overview and risk rating.flv

3.3 MB

01_Introduction.flv

1.7 MB

/Module 06 Cross Site Request Forgery (CSRF)/

05_What makes a CSRF attack possible.flv

14.4 MB

07_Demo Implementing an anti-forgery token in MVC.flv

9.8 MB

03_Demo Anatomy of an attack.flv

9.0 MB

04_Risk in practice Compromised Brazilian modems.flv

7.7 MB

08_Demo Web forms approach to anti-forgery tokens.flv

6.9 MB

09_CSRF fallacies and browser defences.flv

5.4 MB

06_Understanding anti-forgery tokens.flv

4.4 MB

10_Summary.flv

3.7 MB

02_OWASP overview and risk rating.flv

3.5 MB

01_Introduction.flv

1.7 MB

/Module 02 Injection/

03_Demo Anatomy of an attack.flv

13.9 MB

13_Demo Injection automation with Havij.flv

13.4 MB

10_Demo Whitelisting untrusted data.flv

11.9 MB

12_Demo Injection through stored procedures.flv

10.6 MB

07_Demo The principle of least privilege.flv

8.2 MB

11_Demo Entity Framework’s SQL parameterisation.flv

8.1 MB

08_Demo Inline SQL parameterisation.flv

6.1 MB

06_Defining untrusted data.flv

4.5 MB

09_Demo Stored procedure parameterisation.flv

4.3 MB

02_QWASP overwiew and risk rating.flv

3.9 MB

14_Summary.flv

3.6 MB

04_Risk in practice LulzSec and Sony.flv

2.2 MB

01_Introduction.flv

2.1 MB

05_Understanding SQL injection.flv

1.9 MB

/Module 09 Failure to Restrict URL Access/

07_Demo Role based authorisation with the ASP.NET Role Provider.flv

13.1 MB

06_Demo Access controls in ASP.NET part 2 The authorize attribute.flv

12.8 MB

08_Other access controls risk and misconceptions.flv

11.3 MB

05_Demo Access controls in ASP.NET part 1 web.config locations.flv

11.2 MB

04_Risk in practice Apple AT&T leak.flv

7.5 MB

09_Summary.flv

6.1 MB

03_Demo Anatomy of an attack.flv

4.1 MB

02_OWASP overview and risk rating.flv

3.3 MB

01_Introduction.flv

1.5 MB

/Module 01 Introdution/

03_Who's doing the hacking.flv

9.4 MB

04_OWASP and the Top 10.flv

8.5 MB

05_Applying security in depth.flv

4.6 MB

02_Who's getting hacked.flv

3.5 MB

01_Introduction.flv

1.4 MB

/Module 11 Unvalidated Redirects and Forwards/

07_Demo implementing referrer checking.flv

8.9 MB

06_Demo implementing a whitelist.flv

8.8 MB

03_Demo Anatomy of an attack.flv

7.9 MB

05_Understanding the value of unvalidated redirects to attackers.flv

7.2 MB

02_OWASP overview and risk rating.flv

5.0 MB

08_Other issues with the unvalidated redirect risk.flv

5.0 MB

04_Risk in practice US government websites.flv

4.4 MB

09_Summary.flv

3.4 MB

01_Introduction.flv

1.5 MB

/Module 04 Broken Authentication and Session Management/

08_Demo Leveraging ASP.NET membership provider for authentication.flv

8.7 MB

07_Demo Securely configuring session persistence.flv

5.7 MB

10_Siding versus fixed forms timeout.flv

4.8 MB

09_Customising session and forms timeouts to minimise risk windows.flv

4.5 MB

06_The risk of session persistence in the URL versus cookies.flv

4.5 MB

03_Demo Anatomy of an attack.flv

4.0 MB

11_Other broken authentication patterns.flv

3.8 MB

12_Summary.flv

2.9 MB

04_Risk in practice Apple's session fixation.flv

2.4 MB

02_OWASP overview and risk rating.flv

1.9 MB

05_Persisting state in a stateless protocol.flv

1.4 MB

01_Introduction.flv

1.4 MB

 

Total files 121


Copyright © 2024 FileMood.com