BITCQ

Hack Yourself First - How to go on the Cyber-Offense

Size: 1 GB
Magnet link

Name Size
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/06.How loading login forms over HTTP is risky.wmv 43.1 MB
Hack Yourself First - How to go on the Cyber-Offense/hack-yourself-first.zip 34 MB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/05.Testing for missing server side validation.wmv 31.6 MB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/06.Mounting a clickjacking attack.wmv 29.5 MB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/09.Fuzz testing.wmv 28.1 MB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/05.The risk of sending cookies over insecure connections.wmv 26.9 MB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/07.Blind SQL injection.wmv 26.5 MB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/05.Testing cross site request forgery against APIs.wmv 26 MB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/05.Restricting cookie access by path.wmv 23.1 MB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/07.Testing for the risk of persistent XSS.wmv 22.9 MB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/04.Discovering database structure via injection.wmv 22.8 MB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/04.The role of anti-forgery tokens.wmv 21.7 MB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/02.Understanding password strength and attack vectors.wmv 21.5 MB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/07.Exploiting mixed-mode content.wmv 20.5 MB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/08.HTTP verb tampering.wmv 20.5 MB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/03.Capturing requests and manipulating parameters.wmv 19.9 MB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/09.Lack of access controls on diagnostic data.wmv 19.9 MB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/04.Locating at-risk websites.wmv 19.8 MB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/03.Understanding HttpOnly cookies.wmv 19.3 MB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/08.Internal error message leakage.wmv 18 MB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/02.Identifying untrusted data in HTTP request parameters.wmv 17.9 MB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/04.Understanding secure cookies.wmv 16.8 MB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/08.Establishing insecure password storage.wmv 16.7 MB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/08.The X-XSS-Protection header.wmv 16.5 MB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/07.Executing a mass assignment attack.wmv 16.3 MB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/02.How an attacker builds a website risk profile.wmv 15.7 MB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/08.The HSTS header.wmv 15.2 MB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/04.Understanding XSS and output encoding.wmv 15.1 MB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/06.Delivering a payload via reflected XSS.wmv 14.8 MB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/04.Manipulating application logic via parameters.wmv 14.7 MB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/03.Testing for a cross site request forgery risk.wmv 14.2 MB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/02.Understanding SQL injection.wmv 14.2 MB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/05.HTTP fingerprinting of servers.wmv 14.1 MB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/03.Testing for injection risks.wmv 14 MB
Hack Yourself First - How to go on the Cyber-Offense/01.Introduction/03.Introducing a vulnerable website – Supercar Showdown.wmv 13.9 MB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/09.Testing for risks in the 'remember me' feature.wmv 13.4 MB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/08.Secure app patterns.wmv 13.1 MB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/11.Testing for authentication brute force.wmv 13 MB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/06.Automating attacks with Havij.wmv 13 MB
Hack Yourself First - How to go on the Cyber-Offense/01.Introduction/04.Using Chrome's developer tools.wmv 12.7 MB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/06.Reducing risk with cookie expiration.wmv 12.4 MB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/05.Account enumeration.wmv 12.2 MB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/04.Protecting sensitive data in transit.wmv 11.9 MB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/03.Server response header disclosure.wmv 11.7 MB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/02.Cookies 101.wmv 10.2 MB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/02.Understanding untrusted data and sanitisation.wmv 9.8 MB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/05.Identifying the use of output encoding.wmv 9.3 MB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/03.Limiting characters in passwords.wmv 9.1 MB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/07.Using session cookies to further reduce risk.wmv 8.9 MB
Hack Yourself First - How to go on the Cyber-Offense/01.Introduction/06.Modifying requests and responses in Fiddler.wmv 8.7 MB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/09.Summary.wmv 8.6 MB
Hack Yourself First - How to go on the Cyber-Offense/01.Introduction/05.Monitoring and composing requests with Fiddler.wmv 8.4 MB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/05.Harvesting data via injection.wmv 8.2 MB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/10.Summary.wmv 8.1 MB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/12.Summary.wmv 7.9 MB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/03.Establishing input sanitisation practices.wmv 7.8 MB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/02.Understanding cross site attacks.wmv 7.7 MB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/07.The risks in HTML source.wmv 7.5 MB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/06.Disclosure via robots.txt.wmv 7.4 MB
Hack Yourself First - How to go on the Cyber-Offense/01.Introduction/02.Why hack yourself first.wmv 7.2 MB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/03.Understanding a man in the middle attack.wmv 6.3 MB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/10.Summary.wmv 6.2 MB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/10.Re-authenticating before key actions.wmv 6.2 MB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/07.Summary.wmv 5.7 MB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/07.Correctly securing the reset processes.wmv 5.2 MB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/06.Understanding model binding.wmv 5 MB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/09.Summary.wmv 4.9 MB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/09.Summary.wmv 4.6 MB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/02.The three objectives of transport layer protection.wmv 4.2 MB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/08.Summary.wmv 4.1 MB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/04.Emailing credentials on account creation.wmv 3.8 MB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/01.Introduction.wmv 3.6 MB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/06.Denial of service via password reset.wmv 3.5 MB
Hack Yourself First - How to go on the Cyber-Offense/01.Introduction/01.About the course.wmv 3.2 MB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/01.Introduction.wmv 3.2 MB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/01.Introduction.wmv 3 MB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/01.Outline.wmv 2.9 MB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/01.Introduction.wmv 2.6 MB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/01.Introduction.wmv 2.3 MB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/01.Introduction.wmv 2.2 MB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/01.Introduction.wmv 1.8 MB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/06.How loading login forms over HTTP is risky.srt 24 KB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/07.Blind SQL injection.srt 21 KB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/05.Testing for missing server side validation.srt 21 KB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/06.Mounting a clickjacking attack.srt 20 KB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/09.Fuzz testing.srt 20 KB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/04.Discovering database structure via injection.srt 18 KB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/05.The risk of sending cookies over insecure connections.srt 16 KB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/04.The role of anti-forgery tokens.srt 16 KB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/02.Understanding password strength and attack vectors.srt 16 KB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/05.Testing cross site request forgery against APIs.srt 15 KB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/02.Identifying untrusted data in HTTP request parameters.srt 14 KB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/09.Lack of access controls on diagnostic data.srt 14 KB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/08.Internal error message leakage.srt 14 KB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/08.HTTP verb tampering.srt 14 KB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/04.Understanding XSS and output encoding.srt 14 KB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/07.Exploiting mixed-mode content.srt 13 KB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/05.Restricting cookie access by path.srt 13 KB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/06.Delivering a payload via reflected XSS.srt 13 KB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/02.Understanding SQL injection.srt 13 KB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/03.Capturing requests and manipulating parameters.srt 13 KB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/05.HTTP fingerprinting of servers.srt 12 KB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/07.Executing a mass assignment attack.srt 12 KB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/08.Secure app patterns.srt 11 KB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/08.Establishing insecure password storage.srt 11 KB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/11.Testing for authentication brute force.srt 11 KB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/05.Account enumeration.srt 11 KB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/03.Testing for injection risks.srt 11 KB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/03.Testing for a cross site request forgery risk.srt 11 KB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/07.Testing for the risk of persistent XSS.srt 10 KB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/02.How an attacker builds a website risk profile.srt 10 KB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/02.Understanding untrusted data and sanitisation.srt 10 KB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/06.Automating attacks with Havij.srt 10 KB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/02.Cookies 101.srt 9 KB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/04.Manipulating application logic via parameters.srt 9 KB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/03.Server response header disclosure.srt 9 KB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/04.Locating at-risk websites.srt 9 KB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/08.The HSTS header.srt 9 KB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/08.The X-XSS-Protection header.srt 9 KB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/06.Reducing risk with cookie expiration.srt 9 KB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/04.Understanding secure cookies.srt 9 KB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/03.Limiting characters in passwords.srt 8 KB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/04.Protecting sensitive data in transit.srt 8 KB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/09.Summary.srt 8 KB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/09.Testing for risks in the 'remember me' feature.srt 7 KB
Hack Yourself First - How to go on the Cyber-Offense/01.Introduction/04.Using Chrome's developer tools.srt 7 KB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/05.Identifying the use of output encoding.srt 7 KB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/10.Summary.srt 7 KB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/03.Understanding HttpOnly cookies.srt 7 KB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/06.Disclosure via robots.txt.srt 7 KB
Hack Yourself First - How to go on the Cyber-Offense/01.Introduction/03.Introducing a vulnerable website – Supercar Showdown.srt 7 KB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/12.Summary.srt 7 KB
Hack Yourself First - How to go on the Cyber-Offense/01.Introduction/05.Monitoring and composing requests with Fiddler.srt 6 KB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/02.Understanding cross site attacks.srt 6 KB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/03.Establishing input sanitisation practices.srt 6 KB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/07.The risks in HTML source.srt 6 KB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/05.Harvesting data via injection.srt 6 KB
Hack Yourself First - How to go on the Cyber-Offense/01.Introduction/02.Why hack yourself first.srt 6 KB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/10.Re-authenticating before key actions.srt 6 KB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/07.Using session cookies to further reduce risk.srt 6 KB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/10.Summary.srt 5 KB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/03.Understanding a man in the middle attack.srt 5 KB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/07.Summary.srt 5 KB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/06.Understanding model binding.srt 5 KB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/07.Correctly securing the reset processes.srt 5 KB
Hack Yourself First - How to go on the Cyber-Offense/01.Introduction/06.Modifying requests and responses in Fiddler.srt 4 KB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/09.Summary.srt 4 KB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/09.Summary.srt 4 KB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/02.The three objectives of transport layer protection.srt 4 KB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/06.Denial of service via password reset.srt 3 KB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/01.Introduction.srt 3 KB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/08.Summary.srt 3 KB
Hack Yourself First - How to go on the Cyber-Offense/09.Account Management/04.Emailing credentials on account creation.srt 3 KB
Hack Yourself First - How to go on the Cyber-Offense/06.Parameter Tampering/01.Introduction.srt 3 KB
Hack Yourself First - How to go on the Cyber-Offense/01.Introduction/01.About the course.srt 3 KB
Hack Yourself First - How to go on the Cyber-Offense/07.SQL Injection/01.Outline.srt 3 KB
Hack Yourself First - How to go on the Cyber-Offense/05.Internal Implementation Disclosure/01.Introduction.srt 3 KB
Hack Yourself First - How to go on the Cyber-Offense/03.Cross Site Scripting (XSS)/01.Introduction.srt 2 KB
Hack Yourself First - How to go on the Cyber-Offense/08.Cross Site Attacks/01.Introduction.srt 2 KB
Hack Yourself First - How to go on the Cyber-Offense/02.Transport Layer Protection/01.Introduction.srt 2 KB
Hack Yourself First - How to go on the Cyber-Offense/04.Cookies/01.Introduction.srt 2 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...