FileMood

Download SEC522 - Application Security: Securing Web Applications, APIs, and Microservices

SEC522 Application Security Securing Web Applications APIs and Microservices

Name

SEC522 - Application Security: Securing Web Applications, APIs, and Microservices

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

10.6 GB

Total Files

895

Last Seen

2025-06-02 00:18

Hash

4330DDB304B78B1398A77297F57EA22C1EF3FB56

/PDF 2020/

SEC522 - Book 1_61000.pdf

7.6 MB

SEC522 - Book 2_61000.pdf

6.6 MB

SEC522 - Book 3_61000.pdf

8.1 MB

SEC522 - Book 4_61000.pdf

6.7 MB

SEC522 - Book 5_61000.pdf

6.6 MB

SEC522 - Book 6_61000.pdf

4.7 MB

SEC522 - Workbook_61000.pdf

6.2 MB

/USB 2020/

522.20.2.7z

7.2 GB

SEC522 - Lab Setup Instructions.pdf

141.8 KB

/.../1. Web Fundamentals and Security Configurations/1. Introduction/

1. Web Fundamentals and Security Configurations.mp4

116.8 KB

2. Day 1 Outline 1.mp4

1.7 MB

3. Day 1 Outline 2.mp4

55.5 KB

4. The Need to Protect Web Applications.mp4

2.9 MB

5. Are Web Attacks Common.mp4

3.8 MB

6. Core Goals in Security.mp4

6.8 MB

/.../2. Web Application Attacks and Trends/

1. Day 1 Outline.mp4

245.5 KB

2. Recent Attack Trends.mp4

664.5 KB

3. Web API Hacks.mp4

4.6 MB

4. Cryptomining.mp4

4.4 MB

5. Credential Stuffing.mp4

5.8 MB

6. Malicious Script Injection MageCartStyle Attack.mp4

6.1 MB

/.../1. Web Fundamentals and Security Configurations/3. HTTP Basics/

1. Day 1 Outline.mp4

2.0 MB

2. HTTP Overview.mp4

8.8 MB

3. HTTP Communications.mp4

2.0 MB

4. Web Mechanics.mp4

799.1 KB

5. HTTP Request Header Sample.mp4

7.5 MB

6. HTTP Response Header Sample.mp4

8.8 MB

7. Response Body Content.mp4

578.0 KB

8. HTTP Methods 1.mp4

4.9 MB

9. HTTP Methods 2.mp4

3.6 MB

10. Basic Essential Methods.mp4

2.4 MB

11. GET Sample.mp4

2.7 MB

12. POST Sample.mp4

2.8 MB

13. GET vs POST.mp4

4.6 MB

14. HTTP Response Status Code.mp4

6.2 MB

15. Referer Referrer.mp4

5.8 MB

16. Referrer Policy W3C standard.mp4

4.6 MB

17. UserAgent String.mp4

28.5 MB

18. HTTP Capabilities.mp4

4.3 MB

19. HTTP 2.mp4

1.9 MB

20. HTTP 2 Features.mp4

5.4 MB

21. Server Push.mp4

1.2 MB

22. Implications of HTTP 2.mp4

2.6 MB

23. QUIC HTTP3.mp4

4.3 MB

24. Exercise 11.mp4

100.7 MB

/.../4. Web Foundations Overview/

1. Day 1 Outline.mp4

937.1 KB

2. HTTP Basic Authentication.mp4

5.6 MB

3. How Does HTTP Basic Work.mp4

6.0 MB

4. HTTP Digest Authentication.mp4

7.0 MB

5. How Does HTTP Digest Work.mp4

12.0 MB

6. Certificate Authentication.mp4

4.2 MB

7. Integrated Windows Authentication.mp4

5.8 MB

8. FormBased Authentication.mp4

1.7 MB

9. Access Control.mp4

2.5 MB

10. Stateless Nature of HTTP.mp4

3.8 MB

11. Session Tracking Mechanism.mp4

765.6 KB

12. Session Token Flow Diagram.mp4

4.8 MB

13. Cookie 1.mp4

3.2 MB

14. Cookie 2.mp4

2.4 MB

15. Session Token Example.mp4

8.4 MB

16. Session Attacks Interception.mp4

690.2 KB

17. Session Attacks Prediction and Brute Force.mp4

515.3 KB

18. Session Example Whats Wrong with This Cookie 1.mp4

1.9 MB

19. Session Example Whats Wrong with This Cookie 2.mp4

66.7 KB

20. Session Example Whats Wrong with This Cookie 3.mp4

3.6 MB

21. Cookie Insecure Settings Cookie Protection.mp4

795.6 KB

22. Cookie with Secure and Httponly.mp4

747.2 KB

23. Cookie Insecure Settings Surf Jack.mp4

3.9 MB

24. Session Best Practices.mp4

783.3 KB

25. Just Cookies.mp4

2.6 MB

26. Session Toolkits.mp4

587.2 KB

27. Examples of BuiltIn Session in J2EE Java Enterprise Edition.mp4

497.8 KB

28. Examples of Builtin Session in J2EE.mp4

560.7 KB

29. Input to Web Application.mp4

2.5 MB

30. Exercise 12.mp4

45.9 MB

/.../5. Architecture and DefenseinDepth/

1. Day 1 Outline.mp4

661.5 KB

2. Web Application Architecture.mp4

7.4 MB

3. TwoTier Web Application.mp4

2.5 MB

4. ThreeTier Web Application.mp4

7.4 MB

5. Single Page Application SPA.mp4

11.0 MB

6. Microservices Architecture.mp4

10.3 MB

7. Container Architecture.mp4

10.3 MB

8. Serverless Architecture.mp4

10.2 MB

9. Cloud Components.mp4

8.4 MB

10. Web Proxy.mp4

2.9 MB

11. WAF Web Application Firewall Detection and Prevention.mp4

5.9 MB

12. WAF Virtual Patching.mp4

3.1 MB

13. WAF Logging and Monitoring.mp4

3.1 MB

14. Load Balancers.mp4

3.3 MB

15. Sample Architecture 1.mp4

1.4 MB

16. Sample Architecture 2.mp4

3.0 MB

17. Sample Architecture 3.mp4

9.5 MB

18. DefenseInDepth.mp4

1.6 MB

19. DefenseInDepth Example Scenario.mp4

7.1 MB

20. InsertingAltering Extra Headers.mp4

5.7 MB

21. Exercise 13.mp4

140.5 MB

/.../6. Web Infrastructure Security/

1. Day 1 Outline.mp4

146.7 KB

2. Environment and Config.mp4

61.4 KB

3. Insecure Configuration for Platforms.mp4

3.4 MB

4. Directory Browsing.mp4

439.0 KB

5. Directory Browsing Example.mp4

1.3 MB

6. Directory Browsing Mitigation.mp4

3.8 MB

7. Directory Browsing Testing.mp4

2.0 MB

8. Data Leakage.mp4

316.2 KB

9. Whats Leaking Here 1.mp4

6.6 MB

10. Whats Leaking Here 2.mp4

2.2 MB

11. Data Leakage git or svn Folders.mp4

4.6 MB

12. Data Leakage git Files Example.mp4

2.7 MB

13. Data Leakage Mitigation.mp4

2.0 MB

14. Data Leakage Testing.mp4

1.1 MB

15. Backdoor and Service Isolation.mp4

1.2 MB

16. Isolation Multiple Services on One Host.mp4

3.0 MB

17. Isolation Crossing Zone Boundaries.mp4

2.3 MB

18. Isolation Administrative Interface.mp4

835.7 KB

19. Isolation Case Study Twitter 1.mp4

2.4 MB

20. Isolation Case Study Twitter 2.mp4

478.1 KB

21. Isolation Case Study Twitter 3.mp4

347.6 KB

22. Isolation Mitigation.mp4

2.4 MB

23. Reduce Attack Surface.mp4

3.3 MB

24. Cryptomining Case Study on Cloud Servers.mp4

1.8 MB

25. Shodan.mp4

1.1 MB

26. NoSQL Databases Definition.mp4

3.7 MB

27. NoSQL Databases Security 1.mp4

2.3 MB

28. NoSQL Databases Security 2.mp4

938.7 KB

29. Best Practices.mp4

1.8 MB

30. MongoDB Data Leak Example.mp4

1.0 MB

31. Cloud Resources Permission Exposure.mp4

4.6 MB

32. Cloud Resource Permission Issues.mp4

1.1 MB

33. Vulnerability on HostsComponents.mp4

4.2 MB

34. Vulnerability on Software Components.mp4

4.1 MB

35. Vulnerability in Containers.mp4

7.3 MB

36. Packaging and Libraries Dependencies.mp4

2.0 MB

37. Vulnerability Scanning.mp4

547.8 KB

38. Mitigation.mp4

524.1 KB

/.../7. Managing Configurations for Web Apps/

1. Day 1 Outline.mp4

201.6 KB

2. Secure Configuration Templates.mp4

2.7 MB

3. Automated Configuration Management.mp4

3.5 MB

4. Configuration Management Ansible.mp4

2.6 MB

5. Ansible Playbook Example.mp4

2.0 MB

6. OSQuery.mp4

2.0 MB

7. Examples of OSQuery Queries.mp4

2.5 MB

8. Cloud Service Configuration.mp4

688.6 KB

9. CloudFormation.mp4

1.7 MB

10. CloudFormation Template Example.mp4

1.9 MB

11. Cloud Configuration Validation.mp4

2.7 MB

12. Trusted Advisor Example.mp4

1.8 MB

13. Permission Configurations.mp4

600.7 KB

14. Permission Configuration Security Example.mp4

2.5 MB

15. SSRF Vulnerability.mp4

1.2 MB

16. SSRF Further Information Related To Incident.mp4

6.3 MB

17. EC2 Instance Profile.mp4

4.1 MB

18. Normal Flow of Information and Architecture.mp4

7.6 MB

19. IAM Role S3 Permission.mp4

1.6 MB

20. The Credential Access.mp4

2.3 MB

21. What About the Data Access.mp4

925.9 KB

22. Summary of Attack.mp4

3.4 MB

23. Mitigation Strategies.mp4

59.9 KB

24. AWS Metadata Service Version 2.mp4

3.6 MB

25. IMDSv2 Request 1.mp4

1.0 MB

26. IMDSv2 Request 2.mp4

879.4 KB

27. SSRF and Similar Issues Prevention.mp4

1.1 MB

28. Granular IAM Policy.mp4

2.3 MB

29. Bucket Policy.mp4

1.4 MB

30. Exercise 14.mp4

85.3 MB

31. End of Day 1.mp4

72.9 KB

/.../1. Web Fundamentals and Security Configurations/8. References/

1. References 1.mp4

110.1 KB

2. References 2.mp4

80.9 KB

3. References 3.mp4

90.5 KB

4. References 4.mp4

74.2 KB

/.../2. Defense against InputRelated Threats/1. InputRelated Flaws/

1. Defense Against InputRelated Threats.mp4

97.4 KB

2. Day 2 Outline 1.mp4

4.0 MB

3. Day 2 Outline 2.mp4

55.5 KB

4. Input Validation Related Flaws.mp4

202.2 KB

5. Buffer Overflow.mp4

1.1 MB

6. Buffer Overflow Protection C.mp4

4.4 MB

7. Buffer Overflow Mitigation.mp4

4.6 MB

8. Buffer Overflow Testing.mp4

1.7 MB

9. OS Command Injection.mp4

5.1 MB

10. OS Command Injection What Not to Do.mp4

453.7 KB

11. OS Command Injection Mitigation.mp4

1.3 MB

12. OS Command Injection Testing.mp4

3.2 MB

/.../2. HTTP Response Splitting/

1. Day 2 Outline.mp4

235.2 KB

2. HTTP Response Splitting.mp4

410.4 KB

3. HTTP Response Splitting Normal Redirection.mp4

2.8 MB

4. HTTP Response Splitting Redirection Response.mp4

2.5 MB

5. HTTP Response Splitting Attack Mechanism.mp4

1.4 MB

6. Attack with HTTP Response Splitting.mp4

2.3 MB

7. HTTP Response Splitting Attack Results.mp4

3.3 MB

8. HTTP Response Splitting Possibilities.mp4

3.9 MB

9. HTTP Response Splitting Defense.mp4

1.5 MB

10. HTTP Response Splitting Testing.mp4

1.1 MB

/.../2. Defense against InputRelated Threats/3. SQL Injection/

1. Day 2 Outline.mp4

339.2 KB

2. SQL Injection.mp4

2.4 MB

3. SQL Injection Example.mp4

11.8 MB

4. SQL Injection Attack Potentials.mp4

2.8 MB

5. A List of Common Database Error Messages.mp4

7.3 MB

6. Blind SQL Injection.mp4

1.8 MB

7. Blind SQL Injection Example.mp4

11.1 MB

8. Mitigation Filtering Input and Validation.mp4

3.1 MB

9. Filtering Is Hard.mp4

2.0 MB

10. Evasion Example.mp4

2.6 MB

11. Mitigation Escaping Input.mp4

2.9 MB

12. Mitigation Using Language BuiltIn Mitigation.mp4

1.6 MB

13. Escaping Challenges.mp4

2.0 MB

14. Mitigation Parameterized Query.mp4

1.5 MB

15. Mitigation Parameterized Query ASPNET Example.mp4

3.4 MB

16. Mitigation Parameterized Query Java Example.mp4

11.4 MB

17. Mitigation Stored Procedure.mp4

1.9 MB

18. Wrong Way to Use Stored Procedures.mp4

2.7 MB

19. Mitigation Database Permission and Hardening.mp4

3.0 MB

20. Mitigation Limiting SQL Error Messages.mp4

2.7 MB

21. Exercise 21.mp4

45.5 MB

/.../4. CrossSite Request Forgery CSRF/

1. Day 2 Outline.mp4

227.1 KB

2. CSRF.mp4

383.2 KB

3. CSRF The Attack.mp4

440.1 KB

4. CSRF Attack Step 1.mp4

8.5 MB

5. CSRF Attack Step 2.mp4

7.4 MB

6. CSRF Attack Step 3.mp4

3.7 MB

7. CSRF Attack Dependencies.mp4

3.8 MB

8. CSRF Potential Effects.mp4

1.6 MB

9. CSRF Example of an Online Retailer.mp4

2.2 MB

10. CSRF Code for OneClick Attack.mp4

4.4 MB

11. CSRF Attack Diagram.mp4

3.4 MB

12. CSRF Common Techniques to Trigger.mp4

879.2 KB

13. CSRF DefensePOST Method.mp4

1.8 MB

14. CSRF DefenseSession Timeout.mp4

1.7 MB

15. CSRF DefenseHTTP Referer.mp4

3.4 MB

16. CSRF DefenseCAPTCHA.mp4

5.2 MB

17. CSRF DefenseAntiCSRF Token Synchronizer Token.mp4

1.2 MB

18. CSRF DefenseCSRF Token Workflow.mp4

2.3 MB

19. CSRF DefenseAntiCSRF Token Generation.mp4

4.3 MB

20. CSRF SameSite Cookie.mp4

11.9 MB

21. CSRF Defense Matrix.mp4

581.5 KB

22. Standard Library for AntiCSRF.mp4

370.5 KB

23. CSRF Testing Graybox.mp4

2.0 MB

24. Exercise 22.mp4

38.7 MB

/.../5. HTTP Parameter Pollution/

1. Day 2 Outline.mp4

1.8 MB

2. HTTP Parameter Pollution HPP.mp4

2.7 MB

3. HTTP Parameter Behaviors.mp4

1.4 MB

4. Inconsistency in Platform.mp4

1.4 MB

5. Attack Possibilities.mp4

1.0 MB

6. HPP Attack Example.mp4

2.2 MB

7. WAF Bypass.mp4

3.3 MB

8. HPP Mitigations.mp4

1.1 MB

/.../2. Defense against InputRelated Threats/6. CrossSite Scripting/

1. Day 2 Outline.mp4

56.3 KB

2. CrossSite Scripting XSS.mp4

1.6 MB

3. Simple XSS Workflow.mp4

15.3 MB

4. CrossSite Scripting Example.mp4

5.6 MB

5. More Recent Example.mp4

9.2 MB

6. CrossSite Scripting Information.mp4

4.1 MB

7. Cause of XSS.mp4

989.2 KB

8. Potential Effects of XSS.mp4

2.3 MB

9. XSS Reflection.mp4

477.6 KB

10. XSS Reflection Workflow.mp4

1.5 MB

11. XSS Persistent.mp4

2.1 MB

12. XSS Persistent Attack Workflow.mp4

819.9 KB

13. XSS Local DOMBased 1.mp4

1.9 MB

14. XSS Local DOMBased 2.mp4

5.9 MB

15. XSS Defense Filtering.mp4

1.0 MB

16. XSS Filter Pitfall.mp4

2.7 MB

17. More XSS Filter Pitfalls.mp4

694.7 KB

18. XSS Defense Output Encoding.mp4

15.2 MB

19. XSS Defense Output Encoding Example.mp4

872.0 KB

20. XSS Defense Encoding and DOMBased XSS.mp4

2.0 MB

21. Input Filtering or Output Encoding.mp4

1.6 MB

22. Encoding Complications.mp4

4.7 MB

23. Encoding Complex Scenarios HTML Attributes.mp4

2.6 MB

24. Encoding Complex Scenarios JavaScript.mp4

2.3 MB

25. Encoding Complex Scenarios CSS.mp4

568.6 KB

26. Encoding Complex Scenarios URL GET Parameters.mp4

1.9 MB

27. Enterprise Strategy for XSS Defense.mp4

10.1 MB

28. XSS Testing.mp4

271.0 KB

29. Locator.mp4

1.3 MB

30. Exercise 23.mp4

50.9 MB

/.../7. Input Validation Strategy/

1. Day 2 Outline.mp4

1.9 MB

2. Input Validation Strategies.mp4

1.4 MB

3. Validation Steps in an Application.mp4

2.4 MB

4. Input Validation Save Yourself Some Work.mp4

1.1 MB

5. To Validate on Client Side or Not.mp4

1.0 MB

6. Validate Source of Data.mp4

1.7 MB

7. Canonicalization.mp4

812.9 KB

8. Regular Expression.mp4

2.4 MB

9. Regular Expression Example 1.mp4

2.3 MB

10. Regular Expression Example 2.mp4

4.0 MB

11. Regular Expression Basics.mp4

206.7 KB

12. Input Validation Whitelist.mp4

826.3 KB

13. Whitelist Conditions.mp4

680.3 KB

14. Downfall of Whitelist.mp4

846.5 KB

15. Input Validation Blacklist.mp4

4.7 MB

16. Input Validation Blacklist Candidates.mp4

590.9 KB

17. Input Validation Situational Awareness.mp4

355.1 KB

18. SQL Injection Blacklist.mp4

458.2 KB

19. CrossSite Scripting Blacklist.mp4

361.6 KB

20. Path Manipulation Blacklist.mp4

1.1 MB

21. ResponseSplitting Blacklist.mp4

575.6 KB

22. Handling Input Validation Issues.mp4

19.1 MB

23. Validation Correct Context.mp4

1.0 MB

24. Validation Walkthrough.mp4

1.6 MB

25. Reading Files.mp4

597.3 KB

26. Handling HTML Input.mp4

2.0 MB

27. PHP Filter Functions.mp4

343.5 KB

28. ASPNET Validation Controls.mp4

195.0 KB

29. Java Validation.mp4

518.4 KB

/.../2. Defense against InputRelated Threats/8. Unicode/

1. Day 2 Outline.mp4

199.6 KB

2. Unicode Basics ASCII.mp4

1.6 MB

3. Unicode Basics Languages.mp4

744.5 KB

4. Unicode Basics Encodings.mp4

3.5 MB

5. Unicode Basics Representation.mp4

703.3 KB

6. Unicode Is Everywhere.mp4

713.4 KB

7. sǝnssI ʎʇᴉɹnɔǝS lɐnsᴉ Λ.mp4

2.2 MB

8. International Domains.mp4

938.1 KB

9. LookAlike Domains.mp4

865.1 KB

10. LookAlike Domains Explained.mp4

1.5 MB

11. Punycode.mp4

1.5 MB

12. IDN Risks Mitigation.mp4

1.7 MB

13. Policy Example ch.mp4

1.6 MB

14. Unicode Domain Loading.mp4

1.3 MB

15. Unicode Spoofing Example.mp4

865.5 KB

16. Various LookAlike Problems 1.mp4

933.5 KB

17. Various LookAlike Problems 2.mp4

1.1 MB

18. NonVisual Security Issues.mp4

567.7 KB

19. Normalization.mp4

438.3 KB

20. Normalization Example.mp4

992.1 KB

21. Filter Evasion via Normalization.mp4

5.2 MB

22. BestFit Mapping.mp4

316.5 KB

23. BestFit Mapping Example.mp4

450.6 KB

24. Buffer Overflow with Unicode.mp4

624.7 KB

25. Best Practices with Unicode 1.mp4

1.4 MB

26. Best Practices with Unicode 2.mp4

454.7 KB

/.../2. Defense against InputRelated Threats/9. File Upload/

1. Day 2 Outline.mp4

933.9 KB

2. Handling File Upload.mp4

3.0 MB

3. File Upload Risks.mp4

3.4 MB

4. File Upload Handling Strategies 1.mp4

4.3 MB

6. File Upload Handling Strategies 3.mp4

13.9 MB

7. Exercise 24.mp4

78.2 MB

/.../10. Business Logic and Concurrency/

1. Day 2 Outline.mp4

713.9 KB

2. Business Logic and Concurrency.mp4

1.4 MB

3. Business Logic Flaw.mp4

2.0 MB

4. Business Logic Flaw Example 1.mp4

2.4 MB

5. Business Logic Flaw Example 2.mp4

3.5 MB

6. Business Logic Flaw Mitigation.mp4

2.5 MB

7. Business Logic Flaw Testing.mp4

2.3 MB

8. Business Logic Flaw Testing Process.mp4

1.1 MB

9. Concurrency.mp4

834.2 KB

10. Concurrency Race Condition 1.mp4

2.8 MB

11. Concurrency Race Condition 2.mp4

10.6 MB

12. Concurrency Control.mp4

2.0 MB

13. Concurrency Deadlock.mp4

1.8 MB

14. Concurrency Mitigation.mp4

574.6 KB

15. Concurrency Testing.mp4

2.5 MB

16. End of Day 2.mp4

58.7 KB

17. References 1.mp4

103.8 KB

18. References 2.mp4

95.8 KB

19. References 3.mp4

102.6 KB

/.../3. Web Application Authentication and Authorization/1. Authentication/

1. Web Application Authentication and Authorization.mp4

104.8 KB

2. Day 3 Outline 1.mp4

44.3 KB

8. Application Secrets Management.mp4

6.7 MB

9. Application Secrets Management Example.mp4

3.1 MB

10. HardCoded Database Credentials Testing.mp4

893.4 KB

11. HardCoded User Credential Issue.mp4

2.2 MB

12. HardCoded User Credential Defense.mp4

2.8 MB

13. HardCoded User Credential Source Analysis.mp4

531.6 KB

14. HardCoded User Credential Runtime Analysis.mp4

983.8 KB

15. HardCoded User Credential Brute Forcing Tool Brutus.mp4

2.0 MB

16. HardCoded User Credential Brute Forcing Tool JBaah.mp4

2.4 MB

17. Weak Authentication Mechanism.mp4

1.2 MB

19. Weak Authentication Testing.mp4

2.4 MB

20. Browser Caching of Credentials.mp4

1.0 MB

21. Browser Caching of Credentials Defense.mp4

6.3 MB

23. Lack of Account Lockout.mp4

1.5 MB

27. Weak Password Reset.mp4

1.4 MB

/.../3. Web Application Authentication and Authorization/2. Multifactor Authentication/

1. Day 3 Outline.mp4

46.6 KB

2. Multifactor Authentication.mp4

1.6 MB

3. Common Authentication Solutions.mp4

2.1 MB

4. TwoFactor Authentication Stopping Trojan Attacks.mp4

1.8 MB

5. Successful Trojan Attack.mp4

1.4 MB

6. Successful ManInTheMiddle Attack Against TwoFactor Auth.mp4

1.6 MB

7. OutofBand Channel Authentication.mp4

1.9 MB

8. Open Standard OTP.mp4

1.1 MB

9. Open Standard Implementation.mp4

490.3 KB

10. OTP Token Enrollment.mp4

32.7 MB

11. PasswordLess Authentication.mp4

2.8 MB

12. FIDO2WebAuthn Standard.mp4

8.9 MB

13. WebAuthn Registration.mp4

228.3 KB

14. WebAuthn Credential Options Example.mp4

32.1 MB

15. WebAuthn Authentication.mp4

58.9 KB

16. Exercise 31.mp4

62.6 MB

/.../3. Web Application Authentication and Authorization/3. Session Fixation/

1. Day 3 Outline.mp4

1.2 MB

2. Session Fixation.mp4

12.0 MB

3. Session Fixation Details.mp4

729.1 KB

4. Session Fixation Likelihood.mp4

1.7 MB

5. Session Fixation Mitigation 1.mp4

702.7 KB

6. Session Fixation Mitigation 2.mp4

501.6 KB

7. Session Fixation Mitigation 3.mp4

536.8 KB

8. Session Fixation Testing Scenario 1.mp4

742.4 KB

9. Session Fixation Testing Scenario 2.mp4

383.3 KB

10. Exercise 32.mp4

38.5 MB

/.../3. Web Application Authentication and Authorization/4. Access Control/

1. Day 3 Outline.mp4

117.6 KB

2. Access Control Authorization.mp4

652.3 KB

3. Access Control Based on Spoofable Data.mp4

540.3 KB

4. Access Control Based on Spoofable Data Example.mp4

1.3 MB

5. Access Control Based on Spoofable Data Defense.mp4

414.9 KB

6. Access Control Based on Spoofable Data Testing 1.mp4

1.3 MB

7. Access Control Based on Spoofable Data Testing 2.mp4

674.8 KB

8. Lack of Access Control.mp4

803.5 KB

9. Common Horizontal Access Control Flaws.mp4

1.8 MB

10. USPS API Access Control Example.mp4

5.0 MB

11. Lack of Access Control Defense.mp4

715.0 KB

12. Lack of Access Control Source Code Testing.mp4

801.0 KB

13. Lack of Access Control Runtime Testing.mp4

2.2 MB

14. Path Traversal.mp4

1.8 MB

15. Path Traversal Defense.mp4

325.6 KB

16. Path Traversal Testing.mp4

1.2 MB

17. Authorization Best Practice.mp4

1.1 MB

18. Least Privilege Principle.mp4

1.6 MB

19. Access Control Process.mp4

2.7 MB

20. Access Control Planning.mp4

299.8 KB

21. Access Control Planning Starting Point.mp4

2.4 MB

22. Access Control Planning Access Control Matrix.mp4

1.1 MB

23. Layering of Access Controls.mp4

1.4 MB

24. URLBased Access Control 1.mp4

920.4 KB

25. URLBased Access Control 2.mp4

358.9 KB

26. File Permission in Webroot.mp4

1.8 MB

27. Permission Outside of Webroot.mp4

1.3 MB

28. Business Logic Access Control.mp4

665.1 KB

29. Data Access Layer Access Control.mp4

4.0 MB

30. Presentation Layer Access Control.mp4

1.7 MB

/.../5. Single SignOn Session Sharing/

1. Day 3 Outline.mp4

131.4 KB

2. Sharing Authentication and Authorization.mp4

1.9 MB

3. Problem with Login on ThirdParty Sites.mp4

3.1 MB

4. Considerations on Sharing UserData with Third Parties.mp4

4.8 MB

5. Scenarios for Sharing.mp4

681.8 KB

6. Subdomain Solution.mp4

1.5 MB

7. Crypto Token.mp4

767.4 KB

8. Crypto Token Solution Demo 1.mp4

877.8 KB

9. Crypto Token Solution Demo 2.mp4

2.5 MB

10. Authentication Single SignOn.mp4

1.8 MB

11. Federated Identity.mp4

706.8 KB

12. AttributeBased Access Control.mp4

2.0 MB

13. SSO Components.mp4

706.5 KB

14. Generic SSO Diagram.mp4

3.5 MB

15. SSO Difficulties.mp4

1.5 MB

16. Authorization.mp4

1.5 MB

17. OAuth Introduction.mp4

2.1 MB

18. Use Case Example with OAuth.mp4

4.9 MB

19. OAuth 2 Web Server Workflow.mp4

41.2 MB

20. OAuth Security Issues.mp4

7.4 MB

21. Application Implementation Gotchas.mp4

3.8 MB

22. JWT.mp4

12.6 MB

23. OpenID Connect.mp4

2.1 MB

24. Lack of Authentication Example Vehicle Hack 1.mp4

2.1 MB

25. Lack of Authentication Example Vehicle Hack 2.mp4

3.3 MB

26. Lack of Authentication Example Data and Controls Exposed.mp4

383.5 KB

27. Lack of Authentication Example Root Cause of Vulnerability.mp4

1.3 MB

28. Exercise 33.mp4

60.6 MB

/.../3. Web Application Authentication and Authorization/6. Encryption/

1. Day 3 Outline.mp4

49.2 KB

2. Encryption 1.mp4

207.6 KB

3. Encryption 2.mp4

404.4 KB

4. Cryptography.mp4

1.3 MB

5. Encryption Terminology.mp4

1.6 MB

6. TLS Transport Layer Security.mp4

5.7 MB

7. The Web of Trust Establishing Trust.mp4

115.3 MB

8. Lack of TLS.mp4

1.2 MB

9. NonTLS SignIn Page.mp4

3.5 MB

10. Likelihood of Eavesdropping.mp4

1.4 MB

11. TLS Best Practices.mp4

481.9 KB

12. Lack of TLS ShortTerm Fix.mp4

900.3 KB

13. Lack of TLS Testing.mp4

352.6 KB

14. TLS Configuration Flaws.mp4

927.2 KB

15. Some Common TLS Configuration Pitfalls.mp4

1.9 MB

16. TLS Secure Configuration Requirements.mp4

3.1 MB

17. HTTP Strict Transport Security HSTS Header.mp4

761.9 KB

18. TLS Configuration Flaws Defense 1.mp4

560.0 KB

19. TLS Configuration Flaws Defense 2.mp4

1.6 MB

20. Security of TLS Certificate.mp4

829.4 KB

21. Multidomain SSL CertificateHosting.mp4

5.2 MB

22. OCSP Stapling.mp4

2.8 MB

23. TLS Certificate Pinning Do Not Use.mp4

4.5 MB

24. DNS Certification Authority Authorization CAA.mp4

1.6 MB

25. TLS Configuration Flaws Testing.mp4

538.9 KB

/.../7. Encryption at Rest/

1. Day 3 Outline.mp4

232.1 KB

2. Lack of Storage Encryption.mp4

526.7 KB

3. Lack of Storage Encryption Database Encryption.mp4

1.1 MB

4. Common Approaches to Database Encryption.mp4

1.1 MB

5. Key Management.mp4

2.1 MB

6. Best Practices for Key Management.mp4

1.1 MB

7. Database Encryption Case Study.mp4

4.6 MB

8. Database Encryption Common Gotchas.mp4

2.4 MB

9. Alternatives to Database Encryption.mp4

4.1 MB

10. Lack of Storage Encryption Testing.mp4

851.4 KB

11. Public Key Encryption.mp4

588.8 KB

12. Public Key Encryption Diagram.mp4

1.4 MB

13. Example of Public Key Encryption in Practice.mp4

2.1 MB

14. Storing Passwords in Cleartext.mp4

1.0 MB

15. Storing Passwords in Cleartext Hashing.mp4

3.1 MB

16. Storing Passwords in Cleartext Hash Cracking.mp4

1.8 MB

17. Storing Passwords in Cleartext Salted Hash.mp4

14.3 MB

18. Sample Java Implementation.mp4

11.1 MB

19. Storage Format of Password Hash.mp4

3.3 MB

20. Storing Passwords in Cleartext Mitigation.mp4

4.1 MB

21. Storing Passwords in Cleartext Testing.mp4

447.0 KB

22. Cryptography Best Practices.mp4

536.9 KB

23. Storage Encryption Best Practices.mp4

329.9 KB

24. Reasonable Level of Crypto Technologies.mp4

425.2 KB

/.../3. Web Application Authentication and Authorization/8. Tokenization/

1. Day 3 Outline.mp4

177.9 KB

2. Tokenization.mp4

1.2 MB

3. Tokenization Explained.mp4

7.6 MB

4. Use Cases for Tokenization.mp4

19.0 MB

5. Tokenization Gotchas.mp4

879.9 KB

6. Exercise 34.mp4

54.0 MB

7. End of Day 3.mp4

68.9 KB

8. References 1.mp4

103.0 KB

9. References 2.mp4

55.3 KB

10. References 3.mp4

61.2 KB

/.../1. Web Services Intro/

1. Web Services and Frontend Security.mp4

107.7 KB

2. Day 4 Outline 1.mp4

1.7 MB

3. Day 4 Outline 2.mp4

70.2 KB

4. Web Services.mp4

1.5 MB

5. SOA.mp4

1.7 MB

6. XML.mp4

2.1 MB

7. SOAP.mp4

1.7 MB

8. Sample SOAP Request.mp4

1.4 MB

9. Sample SOAP Response.mp4

1.2 MB

10. WSDL.mp4

4.2 MB

11. Sample WSDL.mp4

5.9 MB

12. Sample WSDL Elements 1.mp4

95.7 KB

13. Sample WSDL Elements 2.mp4

83.1 KB

14. Consumer of Web Services.mp4

1.5 MB

15. Web Services Workflow.mp4

6.6 MB

16. WSDL Enumeration.mp4

379.0 KB

17. WSDL Enumeration Prevention.mp4

3.8 MB

/.../2. Web Services Attacks and Defense/

1. Day 4 Outline.mp4

72.3 KB

2. Schema Validation.mp4

4.3 MB

3. DTD Schema.mp4

1.1 MB

4. XML Schema.mp4

556.0 KB

5. XML Schema Poisoning.mp4

3.3 MB

6. Entities.mp4

1.1 MB

7. External Entity Attack.mp4

4.8 MB

8. External Entity Attack Example 1.mp4

1.9 MB

9. External Entity Attack Example 2.mp4

1.8 MB

10. DTDRelated Attacks Mitigation.mp4

1.6 MB

11. XPath Introduction.mp4

380.4 KB

12. XPath Example XML.mp4

225.1 KB

13. XPath Injection Example.mp4

1.6 MB

14. XPath Injection.mp4

1.6 MB

15. XPath Injection Prevention.mp4

385.1 KB

16. Exercise 41.mp4

26.3 MB

/.../3. Web Services Security Features and Options/

1. Day 4 Outline.mp4

416.5 KB

2. Web Services Security.mp4

507.6 KB

3. Web Application Security Applies.mp4

328.4 KB

4. Web Services Specific Attacks.mp4

1.9 MB

5. XML Parameter Tampering.mp4

430.5 KB

6. Oversized Payload.mp4

462.4 KB

7. Error Handling.mp4

578.9 KB

8. SOAP Fault Sample.mp4

785.6 KB

9. Web Services Authentication.mp4

783.2 KB

10. SAML.mp4

621.3 KB

11. SAML Diagram.mp4

2.0 MB

12. SAML Assertion Example.mp4

2.4 MB

13. DOMBased XML Parsing.mp4

1.1 MB

14. SAXBased XML Parsing.mp4

2.3 MB

15. Web Services Firewall.mp4

994.9 KB

16. Web Services Encryption SSL.mp4

505.1 KB

17. WSSecurity.mp4

1.0 MB

18. WSSecurity Authentication.mp4

340.8 KB

19. WSSecurity Authentication Sample.mp4

1.0 MB

20. XML Signature.mp4

1.2 MB

21. XML Encryption.mp4

3.1 MB

22. XML Encryption Example.mp4

459.9 KB

23. Vulnerability SAML with XML Parsing.mp4

2.5 MB

24. Vulnerability SAML with XML Parsing Details.mp4

1.4 MB

/.../4. Web Services And Front End Security/4. AJAX Introduction/

1. Day 4 Outline.mp4

951.5 KB

2. AJAX The Term.mp4

1.1 MB

3. AJAX Technologies Being Used.mp4

589.9 KB

4. Traditional Web Application Model.mp4

851.1 KB

5. AJAX Application Model.mp4

1.6 MB

6. AJAX Workflow.mp4

6.4 MB

7. XMLHttpRequest.mp4

981.1 KB

8. XMLHttpRequest Example.mp4

1.6 MB

9. Fetch API.mp4

1.2 MB

10. Fetch API Example.mp4

1.6 MB

11. AJAX ClientServer Data Transport.mp4

524.4 KB

12. JSON.mp4

1.4 MB

13. JSON In Security.mp4

1.6 MB

14. JSON Parsing.mp4

1.7 MB

15. Same Origin Policy.mp4

2.0 MB

16. Purpose of Same Origin Policy.mp4

2.4 MB

17. Same Origin Policy Diagram.mp4

1.3 MB

18. Same Origin Policy Restriction.mp4

2.0 MB

19. AJAX Security Overview.mp4

600.1 KB

20. Compare AJAX with Traditional Web Application.mp4

1.8 MB

21. AJAX More Attack Surface.mp4

861.0 KB

22. AJAX Even More Attack Surface.mp4

477.6 KB

23. AJAX Gaining Internal Knowledge.mp4

1.4 MB

24. AJAX Exposes Internal Layers.mp4

1.1 MB

25. New AJAX Areas of Concern.mp4

2.2 MB

26. Exercise 42.mp4

19.5 MB

27. AJAX XSS Super Effects.mp4

2.3 MB

28. DOMBased XSS.mp4

3.2 MB

29. AJAX CSRF.mp4

1.4 MB

30. AJAX XSS CSRF.mp4

1.6 MB

31. Repudiation Problem.mp4

5.9 MB

32. AJAX SAMY Attack.mp4

1.5 MB

33. AJAX SAMY Worm Diagram 1.mp4

5.1 MB

34. AJAX SAMY Worm Diagram 2.mp4

3.2 MB

35. AJAX SAMY Worm Diagram 3.mp4

2.1 MB

36. AJAX SAMY Worm Diagram 4.mp4

578.1 KB

37. AJAX SAMY Worm Screenshot.mp4

1.2 MB

38. AJAX SAMY Worm Circumvention.mp4

6.1 MB

/.../4. Web Services And Front End Security/5. CrossDomain AJAX/

1. Day 4 Outline.mp4

429.8 KB

2. CrossDomain AJAX Diagram.mp4

2.8 MB

3. AJAX ProxyBridge.mp4

2.0 MB

4. AJAX Bridging Security.mp4

1.6 MB

5. JSONP.mp4

2.6 MB

6. JSONP Response Example.mp4

2.2 MB

7. JSONP Security Issues.mp4

28.2 MB

8. XHR Security.mp4

1.1 MB

9. XHR Security Improvements.mp4

1.6 MB

10. Test Result Chrome httpsiscsanseduxhrtesthtml.mp4

2.6 MB

11. New Generation of CrossDomain Requests.mp4

1.2 MB

12. XMLHttpRequest Level 2.mp4

3.4 MB

13. W3C Access Control.mp4

241.2 KB

14. Simple vs PreFlight Requests.mp4

2.4 MB

15. Simple Request 1.mp4

1.7 MB

16. Simple Request 2.mp4

1.7 MB

17. PreFlight Request 1.mp4

1.3 MB

18. PreFlight Request 2.mp4

1.9 MB

19. PreFlight Request 3.mp4

16.6 MB

20. New Request Headers .mp4

808.0 KB

21. New Response Headers 1.mp4

1.4 MB

22. New Response Headers 2.mp4

416.8 KB

23. Simple Request Example.mp4

201.9 KB

24. Simple Response Example.mp4

236.0 KB

25. Good and Bad of XDRXHR L2.mp4

2.9 MB

26. Exercise 43.mp4

32.2 MB

/.../6. AJAX Security Best Practices/

1. Day 4 Outline.mp4

80.5 KB

2. AJAX Security Analysis.mp4

1.9 MB

3. AJAX Best Practices.mp4

1.1 MB

4. AJAX Mistakes.mp4

405.3 KB

5. AJAX Defense Summary.mp4

1.3 MB

6. AJAX Testing Summary.mp4

1.8 MB

/.../4. Web Services And Front End Security/7. REST Security/

1. Day 4 Outline.mp4

1.2 MB

2. REST.mp4

4.9 MB

3. REST Basics.mp4

3.8 MB

4. REST Inner Workings.mp4

2.3 MB

5. RealWorld Examples.mp4

21.3 MB

6. REST Security.mp4

2.3 MB

7. REST Security Defense.mp4

5.7 MB

8. REST Authentication.mp4

2.6 MB

9. REST and CSRF.mp4

6.9 MB

10. REST API Access Restriction.mp4

15.0 MB

/.../8. Modern JavaScript Frameworks/

1. Day 4 Outline.mp4

229.9 KB

2. Backend JavaScript.mp4

1.8 MB

4. Security Best Practices in Nodejs.mp4

3.8 MB

5. More Security Best Practices in Nodejs.mp4

2.1 MB

6. ClientSide Framework.mp4

3.1 MB

7. JavaScript Frontend Vulnerabilities CSRF.mp4

1.7 MB

8. JavaScript Frontend Vulnerabilities Template Injections.mp4

3.3 MB

9. JavaScript Frontend Vulnerabilities XSS.mp4

5.5 MB

10. DOMBased HTML Sanitization.mp4

3.6 MB

11. mXSS at Google Search Example.mp4

2.2 MB

12. mXSS Basics Consider the HTML Cases.mp4

4.1 MB

13. mXSS Compare Side by Side.mp4

2.6 MB

14. mXSS Closure Library DOMPurify.mp4

3.6 MB

15. mXSS Using Template.mp4

19.4 MB

16. mXSS The Downfall No Script No Evil.mp4

916.1 KB

18. mXSS Googles Fix.mp4

1.4 MB

19. mXSS Summary.mp4

823.5 KB

/.../9. Browser Defense Mechanism/

1. Day 4 Outline.mp4

2.1 MB

10. CSP Directives 4.mp4

1.3 MB

11. CSP Example 1.mp4

2.0 MB

12. CSP Example 2.mp4

3.0 MB

23. End of Day 4.mp4

71.3 KB

24. AJAX References.mp4

130.5 KB

25. Web Services References.mp4

123.7 KB

26. REST References.mp4

106.2 KB

27. JavaScript Full Stack References.mp4

128.7 KB

28. Browser Defense References.mp4

124.9 KB

/.../5. CuttingEdge Web Security/1. Serialization Security/

1. CuttingEdge Web Security.mp4

102.2 KB

2. Day 5 Outline 1.mp4

1.7 MB

3. Day 5 Outline 2.mp4

254.0 KB

4. Serialization Security.mp4

2.5 MB

5. Serialization Illustrated.mp4

2.8 MB

6. Deserialization Security Illustration.mp4

10.6 MB

7. Serialization ChainGadget.mp4

4.6 MB

8. Exploiting the Deserialization.mp4

7.8 MB

9. Serialization with Other Languages.mp4

6.1 MB

10. Serialization Security Defense.mp4

6.5 MB

/.../5. CuttingEdge Web Security/2. DNS Rebinding/

1. Day 5 Outline.mp4

723.7 KB

2. DNS Rebinding.mp4

813.9 KB

3. DNS Rebinding Diagram 1.mp4

9.3 MB

4. DNS Rebinding Diagram 2.mp4

4.4 MB

5. Multiple A Records.mp4

1.7 MB

6. Basic Effects of DNS Rebinding.mp4

4.0 MB

7. DNS Pinning.mp4

1.4 MB

8. DNS Pinning Diagram 1.mp4

3.7 MB

9. DNS Pinning Diagram 2.mp4

1.6 MB

10. AntiDNS Pinning.mp4

692.9 KB

11. AntiDNS Pinning Diagram 1.mp4

1.6 MB

12. AntiDNS Pinning Diagram 2.mp4

1.6 MB

13. AntiDNS Pinning Diagram 3.mp4

3.1 MB

14. Flash Rebinding.mp4

274.0 KB

15. Flash Rebinding Diagram 1.mp4

3.4 MB

16. Flash Rebinding Diagram 2.mp4

1,000.0 KB

17. Flash Rebinding Diagram 3.mp4

2.1 MB

18. DNS Rebinding Advanced Effects.mp4

422.1 KB

19. Mitigation.mp4

1.2 MB

20. DNSWall.mp4

1.6 MB

21. Smarter DNS Pinning.mp4

2.1 MB

22. Server Defense.mp4

4.5 MB

23. DNS Rebinding Summary.mp4

985.3 KB

24. Exercise 51.mp4

9.2 MB

/.../5. CuttingEdge Web Security/3. Clickjacking/

1. Day 5 Outline.mp4

258.5 KB

2. Clickjacking.mp4

901.2 KB

3. Clickjacking Background.mp4

890.7 KB

4. Clickjacking Basics.mp4

496.9 KB

5. Clickjacking Invisible Content.mp4

1.1 MB

6. Clickjacking Diagram 1.mp4

2.9 MB

7. Clickjacking Diagram 2.mp4

3.7 MB

8. Effects of Clickjacking.mp4

1.9 MB

9. Attack Scenario Flash Attack 1.mp4

664.8 KB

10. Attack Scenario Flash Attack 2.mp4

2.6 MB

11. Mitigation.mp4

1.1 MB

12. Framebusting.mp4

815.2 KB

13. AntiFramebusting.mp4

1.0 MB

14. AntiFramebusting Diagram.mp4

412.1 KB

15. NonJavaScript Framebusting.mp4

2.7 MB

16. NoScript Firefox.mp4

1.6 MB

17. Clickjacking Mitigation Summary.mp4

1.5 MB

18. Exercise 52.mp4

12.1 MB

/.../4. Transparent Proxy Abuse and Same Origin Policy/

1. Day 5 Outline.mp4

797.2 KB

2. Transparent Proxy Abuse.mp4

1.2 MB

3. Transparent Proxy Abuse Diagram 1.mp4

6.5 MB

4. Transparent Proxy Abuse Diagram 2.mp4

1.5 MB

5. Transparent Proxy Abuse Diagram 3.mp4

2.0 MB

6. Transparent Proxy Abuse Diagram 4.mp4

6.1 MB

7. Transparent Proxy Abuse Recap.mp4

746.7 KB

8. Transparent Proxy Abuse Mitigation.mp4

1.1 MB

9. Same Origin Policy Still Holds.mp4

2.8 MB

10. DefenseInDepth Works.mp4

241.0 KB

11. Extra Mitigations.mp4

2.2 MB

/.../5. CuttingEdge Web Security/5. HTML5/

1. Day 5 Outline.mp4

164.0 KB

2. HTML5.mp4

1.2 MB

3. HTML5 Video.mp4

308.0 KB

4. HTML5 Video Security.mp4

1.5 MB

5. HTML5 Web Storage.mp4

1.1 MB

6. HTML5 Web Storage Details.mp4

1.1 MB

7. HTML5 IndexedDB.mp4

2.7 MB

8. HTML5 Offline Application.mp4

1.0 MB

9. HTML5 Offline Manifest Example.mp4

2.0 MB

10. HTML5 FileAPI.mp4

4.3 MB

11. HTML5 ClientSide Storage Security.mp4

1.9 MB

12. HTML5 WebSockets.mp4

3.2 MB

13. HTML5 WebSocket Request.mp4

759.6 KB

14. HTML5 WebSocket Response.mp4

763.9 KB

15. HTML5 WebSocket Implementation.mp4

627.9 KB

16. HTML5 IFrame Sandbox.mp4

1.0 MB

17. HTML5 Sandbox Attribute.mp4

2.8 MB

18. HTML5 CrossDocument Messaging.mp4

1.8 MB

19. HTML5 CrossDocument Messaging Security.mp4

683.4 KB

20. HTML5 New Elements.mp4

481.4 KB

21. HTML5 Validation.mp4

2.8 MB

22. Geolocation.mp4

4.7 MB

23. HTML5 Summary.mp4

904.5 KB

24. Exercise 53.mp4

10.7 MB

/.../5. CuttingEdge Web Security/6. Operational Security/

1. Day 5 Outline.mp4

592.7 KB

2. Web Application Operational Security.mp4

425.6 KB

3. Monitoring.mp4

2.3 MB

4. Google Webmaster Tool.mp4

966.6 KB

5. Google Safe Browsing Screenshot.mp4

578.7 KB

6. Code Promotion.mp4

2.9 MB

7. Code Deployment Security.mp4

4.1 MB

8. Backups.mp4

1.2 MB

9. Domain Registration Security.mp4

2.4 MB

10. Attack Against Registrars Record.mp4

2.2 MB

11. Failing Over.mp4

971.3 KB

12. Failover Mechanism.mp4

1.1 MB

13. Replicating Server Content.mp4

1.7 MB

14. Leveraging External Content.mp4

1.3 MB

15. Subresource Integrity SRI.mp4

1.2 MB

16. SRI Example.mp4

3.0 MB

17. TicketmasterInbenta Breach.mp4

5.0 MB

18. TicketmasterInbenta Breach Potential Mitigation.mp4

5.6 MB

/.../5. CuttingEdge Web Security/7. Incident Handling/

1. Day 5 Outline.mp4

795.0 KB

2. Incident Handling Plan.mp4

1.2 MB

3. Six Steps of Incident Handling.mp4

264.0 KB

4. Preparation for Web App Incident.mp4

3.6 MB

5. Identification.mp4

2.2 MB

6. Containment.mp4

668.7 KB

7. Eradication.mp4

1.1 MB

8. Recovery.mp4

1.6 MB

9. Lessons Learned.mp4

1.1 MB

10. How to Fix Vulnerabilities.mp4

1.7 MB

11. When Vulnerabilities Are Discovered.mp4

3.0 MB

12. Quick Fix for Critical Vulnerabilities.mp4

476.2 KB

13. Strategic Fix and Testing.mp4

1.2 MB

14. Fixing Vulnerabilities Pitfall.mp4

90.7 KB

15. Case Study Twitter 1.mp4

2.8 MB

16. Case Study Twitter 2.mp4

577.7 KB

17. Intrusion Detection in Web App.mp4

425.7 KB

18. TrafficBased Approach 1.mp4

1.4 MB

19. TrafficBased Approach 2.mp4

1.3 MB

20. TrafficBased Approach Pitfall.mp4

816.3 KB

21. Application Intrusion Detection.mp4

3.6 MB

22. Application Intrusion Detection Pitfall.mp4

523.3 KB

23. Hybrid Intrusion Detection.mp4

4.4 MB

/.../5. CuttingEdge Web Security/8. Security Testing/

1. Day 5 Outline.mp4

252.0 KB

2. Web Security Testing.mp4

601.5 KB

3. Code Analysis.mp4

1.2 MB

4. Runtime Analysis.mp4

734.7 KB

5. Compare SAST and DAST.mp4

4.0 MB

6. Interactive Application Security Testing IAST.mp4

2.6 MB

7. Penetration Test.mp4

2.2 MB

8. Cost of Flaw Remediation versus Time.mp4

1.0 MB

9. Configuration Testing.mp4

1.5 MB

10. Dependency Testing.mp4

1.6 MB

11. Testing Through Development.mp4

8.5 MB

12. Automate Testing.mp4

1.0 MB

13. Types of Testing.mp4

2.9 MB

14. Internal vs External Third Party.mp4

1.6 MB

15. Pay for Vulnerability Program.mp4

3.5 MB

16. Testing Challenges.mp4

1.7 MB

17. Pen Test Frameworks.mp4

990.4 KB

18. Tools.mp4

774.9 KB

19. Basic Toolkit of Web Application Pen Testers.mp4

368.9 KB

20. Pen Testing Best Practices 1.mp4

2.6 MB

21. Pen Testing Best Practices 2.mp4

426.9 KB

22. WARNING PERMISSION.mp4

2.0 MB

23. Exercise 54.mp4

12.9 MB

/.../9. Logging and Error Handling/

1. Day 5 Outline.mp4

206.5 KB

2. Logging and Error Handling.mp4

874.8 KB

3. Information Leak via Error Message.mp4

343.0 KB

4. Bad Error Messages 1.mp4

1.7 MB

5. Bad Error Messages 2.mp4

1.0 MB

6. What Can Be Leaked Here.mp4

1.0 MB

7. Information Leak via Error Message Mitigation.mp4

2.0 MB

8. Information Leak via Error Message Testing.mp4

298.8 KB

9. Mishandling of Error Condition.mp4

1.7 MB

10. Error Without Action.mp4

1.3 MB

11. Error with Inappropriate Action.mp4

1.7 MB

12. Mishandling of Error Condition Mitigation.mp4

518.4 KB

13. Testing for Error Conditions and Actions.mp4

1.0 MB

14. General Approach to Handling Errors.mp4

333.5 KB

15. Log Injection.mp4

966.1 KB

16. Log Injection Code Example.mp4

1.3 MB

17. Log Injection Attack.mp4

2.5 MB

18. Log Injection Mitigation.mp4

1.9 MB

19. Error Handling Best Practices.mp4

1.4 MB

20. What to Log Authentication and Access Control.mp4

68.0 MB

21. What to Log Data Access.mp4

636.4 KB

22. What to Log Errors.mp4

431.4 KB

23. WAF Device for Logging.mp4

623.5 KB

24. Exercise 55.mp4

66.4 MB

/.../5. CuttingEdge Web Security/10. AntiAutomation/

1. Day 5 Outline.mp4

202.5 KB

2. AntiAutomation and AntiSpam.mp4

1.1 MB

3. Earn 50K by Automation.mp4

4.0 MB

4. CAPTCHA.mp4

3.5 MB

5. Careful CAPTCHA Is Broken.mp4

5.0 MB

6. Rate Limit.mp4

1.6 MB

7. Web Link Spam.mp4

485.7 KB

8. Web Link Spam Example.mp4

1.4 MB

9. Web Link Spam Mitigation.mp4

2.2 MB

10. JavaScript Trick.mp4

535.3 KB

11. Honeytoken.mp4

3.6 MB

12. Honeytoken Ideas.mp4

2.1 MB

13. Honeytoken Example 1.mp4

637.8 KB

14. Honeytoken Example 1 Diagram.mp4

565.5 KB

15. Honeytoken Example 2.mp4

80.5 KB

16. Honeytoken Example 2 Diagram.mp4

1.4 MB

/.../5. CuttingEdge Web Security/11. IPv6/

1. Day 5 Outline.mp4

195.2 KB

2. Web Applications and IPv6.mp4

1.0 MB

3. IPv6 Address Format.mp4

1.1 MB

4. Interface ID.mp4

491.3 KB

5. Logging.mp4

709.9 KB

6. IPv6 Abbreviations.mp4

299.5 KB

7. Input Validation.mp4

394.0 KB

8. Advanced IPv6 Validation.mp4

692.8 KB

9. IPv6 and Firewalls IPS.mp4

489.9 KB

10. IPv6 Tunnels.mp4

474.3 KB

11. IPv6 Summary.mp4

1.4 MB

12. End of Day 5.mp4

62.9 KB

13. References 1.mp4

111.3 KB

14. References 2.mp4

120.8 KB

15. References 3.mp4

118.9 KB

16. References 4.mp4

92.3 KB

17. References 5.mp4

113.2 KB

18. References 6.mp4

82.2 KB

/.../1. System Development Lifecycle SDLC/

1. Capture and Defend the Flag Exercise.mp4

99.5 KB

/.../6. Capture and Defend the Flag Exercise/2. Capstone Exercise/

2. Scenario.mp4

62.3 KB

3. Procedure.mp4

80.2 KB

4. Fix It.mp4

75.2 KB

5. Start Now.mp4

68.7 KB

6. Reference.mp4

49.3 KB

7. SANS Technology Institute STI Masters Degree Curriculum.mp4

44.7 KB

8. COURSE RESOURCES AND CONTACT INFORMATION.mp4

50.7 KB

 

Total files 895


Copyright © 2025 FileMood.com