Урок 1.00:02:33
Overview
Урок 2.00:03:38
The State of Web Application Security
Урок 3.00:05:43
Understanding Web Application Security
Урок 4.00:08:48
Query Strings, Routing, and HTTP Verbs
Урок 5.00:03:53
The Discoverability of Client Security Constructs
Урок 6.00:08:31
Protections Offered by Browsers
Урок 7.00:02:27
What the Browser Can't Defend Against
Урок 8.00:01:27
What's Not Covered in This Course
Урок 9.00:02:09
Summary
Урок 10.00:02:17
Overview
Урок 11.00:06:02
Spidering with NetSparker
Урок 12.00:09:25
Forced Browsing with Burp Suite
Урок 13.00:04:28
Directory Traversal
Урок 14.00:02:36
Banner Grabbing with Wget
Урок 15.00:03:49
Server Fingerprinting with Nmap
Урок 16.00:03:40
Discovery of Development Artefacts with Acunetix
Урок 17.00:04:21
Discovery of Services via Generated Documentation
Урок 18.00:02:56
Discovering Framework Risks
Урок 19.00:01:49
Identifying Vulnerable Targets with Shodan
Урок 20.00:01:50
Summary
Урок 21.00:02:01
Overview
Урок 22.00:02:19
OWASP and the Top 10 Web Application Security Risks
Урок 23.00:05:47
Understanding Untrusted Data
Урок 24.00:06:12
Parameter Tampering
Урок 25.00:03:40
Hidden Field Tampering
Урок 26.00:04:30
Mass Assignment Attacks
Урок 27.00:02:51
Cookie Poisoning
Урок 28.00:04:30
Insecure Direct Object References
Урок 29.00:04:36
Defending Against Tampering
Урок 30.00:01:35
Summary
Урок 31.00:02:07
Overview
Урок 32.00:09:34
Reflected Cross Site Scripting (XSS)
Урок 33.00:05:31
Persistent Cross Site Scripting (XSS)
Урок 34.00:03:40
Defending Against XSS Attacks
Урок 35.00:03:26
Identifying XSS Risks and Evading Filters
Урок 36.00:07:27
Client Only Validation
Урок 37.00:08:16
Insufficient Transport Layer Security
Урок 38.00:07:37
Cross Site Request Forgery (CSRF)
Урок 39.00:02:41
Summary
Урок 40.00:02:56
Overview
Урок 41.00:02:49
Understanding Weaknesses in Identity Management
Урок 42.00:08:04
Identity Enumeration
Урок 43.00:04:52
Weaknesses in the 'Remember Me' Feature
Урок 44.00:02:28
Resources Missing Access Controls
Урок 45.00:04:07
Insufficient Access Controls
Урок 46.00:03:16
Privilege Elevation
Урок 47.00:02:11
Summary
Урок 48.00:02:26
Overview
Урок 49.00:03:47
Understanding DoS
Урок 50.00:02:50
Exploiting Password Resets
Урок 51.00:05:11
Exploiting Account Lockouts
Урок 52.00:04:40
Distributed Denial of Service (DDoS)
Урок 53.00:05:00
Automating DDoS Attacks with LOIC
Урок 54.00:03:21
DDoS as a Service
Урок 55.00:03:34
Features at Risk of a DDoS Attack
Урок 56.00:09:40
Other DDoS Attacks and Mitigations
Урок 57.00:02:41
Summary
Урок 58.00:02:34
Overview
Урок 59.00:06:36
Improper Error Handling
Урок 60.00:05:49
Understanding Salted Hashes
Урок 61.00:07:43
Insecure Cryptographic Storage
Урок 62.00:06:39
Unvalidated Redirects and Forwards
Урок 63.00:04:44
Exposed Exceptions Logs with ELMAH
Урок 64.00:08:07
Vulnerabilities in Web Services
Урок 65.00:03:19
Summary