• Урок 1. 00:02:33
    Overview
  • Урок 2. 00:03:38
    The State of Web Application Security
  • Урок 3. 00:05:43
    Understanding Web Application Security
  • Урок 4. 00:08:48
    Query Strings, Routing, and HTTP Verbs
  • Урок 5. 00:03:53
    The Discoverability of Client Security Constructs
  • Урок 6. 00:08:31
    Protections Offered by Browsers
  • Урок 7. 00:02:27
    What the Browser Can't Defend Against
  • Урок 8. 00:01:27
    What's Not Covered in This Course
  • Урок 9. 00:02:09
    Summary
  • Урок 10. 00:02:17
    Overview
  • Урок 11. 00:06:02
    Spidering with NetSparker
  • Урок 12. 00:09:25
    Forced Browsing with Burp Suite
  • Урок 13. 00:04:28
    Directory Traversal
  • Урок 14. 00:02:36
    Banner Grabbing with Wget
  • Урок 15. 00:03:49
    Server Fingerprinting with Nmap
  • Урок 16. 00:03:40
    Discovery of Development Artefacts with Acunetix
  • Урок 17. 00:04:21
    Discovery of Services via Generated Documentation
  • Урок 18. 00:02:56
    Discovering Framework Risks
  • Урок 19. 00:01:49
    Identifying Vulnerable Targets with Shodan
  • Урок 20. 00:01:50
    Summary
  • Урок 21. 00:02:01
    Overview
  • Урок 22. 00:02:19
    OWASP and the Top 10 Web Application Security Risks
  • Урок 23. 00:05:47
    Understanding Untrusted Data
  • Урок 24. 00:06:12
    Parameter Tampering
  • Урок 25. 00:03:40
    Hidden Field Tampering
  • Урок 26. 00:04:30
    Mass Assignment Attacks
  • Урок 27. 00:02:51
    Cookie Poisoning
  • Урок 28. 00:04:30
    Insecure Direct Object References
  • Урок 29. 00:04:36
    Defending Against Tampering
  • Урок 30. 00:01:35
    Summary
  • Урок 31. 00:02:07
    Overview
  • Урок 32. 00:09:34
    Reflected Cross Site Scripting (XSS)
  • Урок 33. 00:05:31
    Persistent Cross Site Scripting (XSS)
  • Урок 34. 00:03:40
    Defending Against XSS Attacks
  • Урок 35. 00:03:26
    Identifying XSS Risks and Evading Filters
  • Урок 36. 00:07:27
    Client Only Validation
  • Урок 37. 00:08:16
    Insufficient Transport Layer Security
  • Урок 38. 00:07:37
    Cross Site Request Forgery (CSRF)
  • Урок 39. 00:02:41
    Summary
  • Урок 40. 00:02:56
    Overview
  • Урок 41. 00:02:49
    Understanding Weaknesses in Identity Management
  • Урок 42. 00:08:04
    Identity Enumeration
  • Урок 43. 00:04:52
    Weaknesses in the 'Remember Me' Feature
  • Урок 44. 00:02:28
    Resources Missing Access Controls
  • Урок 45. 00:04:07
    Insufficient Access Controls
  • Урок 46. 00:03:16
    Privilege Elevation
  • Урок 47. 00:02:11
    Summary
  • Урок 48. 00:02:26
    Overview
  • Урок 49. 00:03:47
    Understanding DoS
  • Урок 50. 00:02:50
    Exploiting Password Resets
  • Урок 51. 00:05:11
    Exploiting Account Lockouts
  • Урок 52. 00:04:40
    Distributed Denial of Service (DDoS)
  • Урок 53. 00:05:00
    Automating DDoS Attacks with LOIC
  • Урок 54. 00:03:21
    DDoS as a Service
  • Урок 55. 00:03:34
    Features at Risk of a DDoS Attack
  • Урок 56. 00:09:40
    Other DDoS Attacks and Mitigations
  • Урок 57. 00:02:41
    Summary
  • Урок 58. 00:02:34
    Overview
  • Урок 59. 00:06:36
    Improper Error Handling
  • Урок 60. 00:05:49
    Understanding Salted Hashes
  • Урок 61. 00:07:43
    Insecure Cryptographic Storage
  • Урок 62. 00:06:39
    Unvalidated Redirects and Forwards
  • Урок 63. 00:04:44
    Exposed Exceptions Logs with ELMAH
  • Урок 64. 00:08:07
    Vulnerabilities in Web Services
  • Урок 65. 00:03:19
    Summary
Удален по просьбе правообладателя