RAR-files |
pws-8754-xqzt.rar |
50,000,000 |
39CB0812 |
pws-8754-xqzt.r00 |
50,000,000 |
629D8CA5 |
pws-8754-xqzt.r01 |
50,000,000 |
73138CF9 |
pws-8754-xqzt.r02 |
50,000,000 |
63C90625 |
pws-8754-xqzt.r03 |
50,000,000 |
779072C3 |
pws-8754-xqzt.r04 |
50,000,000 |
457401A8 |
pws-8754-xqzt.r05 |
50,000,000 |
2A78E62D |
pws-8754-xqzt.r06 |
50,000,000 |
6049431C |
pws-8754-xqzt.r07 |
50,000,000 |
62FEABEB |
pws-8754-xqzt.r08 |
50,000,000 |
E1798E2B |
pws-8754-xqzt.r09 |
40,278,228 |
A0C10859 |
|
Total size: |
540,278,228 |
|
|
Archived
files |
Web Security [Video]\3.Various Injection Attacks\12.SQL Injection Cheat Sheet.mp4
[daefe0ff2a055b15]
|
25,118,729 |
F7E3818E |
Web Security [Video]\3.Various Injection Attacks\10.SQL Injection and Various Injection Vulnerabilities.mp4
[fb6c39f2dfc3826c]
|
8,486,662 |
85DAC818 |
Web Security [Video]\3.Various Injection Attacks\11.Effect of SQL Injection on Web Application.mp4
[6b7f1035c5fb34c7]
|
34,908,231 |
2524691F |
Web Security [Video]\3.Various Injection Attacks\13.Prevention Techniques from SQL Injection.mp4
[c2e8764ad522d410]
|
6,950,119 |
1A0F28E2 |
Web Security [Video]\5.CSRF and Logic Flaws \19.Effect of CSRF on Web Applications.mp4
[fa697713443cac29]
|
24,657,563 |
BB55620B |
Web Security [Video]\5.CSRF and Logic Flaws \18.Overview of Cross-Site Request Forgery Attack(CSRF).mp4
[4f9746876e9cb9e9]
|
6,393,654 |
0C860BB4 |
Web Security [Video]\5.CSRF and Logic Flaws \21.Defend Against CSRF Attack.mp4
[62f0ca59c335973b]
|
8,106,170 |
7470A99E |
Web Security [Video]\5.CSRF and Logic Flaws \20.Cheat Sheet of CSRF Attack.mp4
[6a62ab99de3ec177]
|
29,627,047 |
B16BA8D7 |
Web Security [Video]\6.Avoiding_Detecting Other Vulnerabilities \23.Denial-of-Service (DOS Attack) Vulnerability Detection.mp4
[71454bae03e8e5d0]
|
33,692,761 |
248A3E47 |
Web Security [Video]\6.Avoiding_Detecting Other Vulnerabilities \25.File Uploads and Transfers Vulnerability Detection.mp4
[ba3e9a0efb245175]
|
41,241,049 |
EEF78E8E |
Web Security [Video]\6.Avoiding_Detecting Other Vulnerabilities \22.Buffer Overflow Vulnerability Detection.mp4
[75f588cf5916552c]
|
27,411,535 |
57E7BC60 |
Web Security [Video]\6.Avoiding_Detecting Other Vulnerabilities \24.Password Brute Forcing Attacks Detection Methods.mp4
[12b85a9872b47eff]
|
40,812,876 |
B0895A4C |
Web Security [Video]\4.JavaScript and XSS Attack \16.Cheat Sheet of XSS Attack.mp4
[51db750b9a34e5ea]
|
28,377,591 |
351F27CF |
Web Security [Video]\4.JavaScript and XSS Attack \14.XSS and JavaScript Attack.mp4
[2fb998eb18c38396]
|
6,510,364 |
3DAC4DD3 |
Web Security [Video]\4.JavaScript and XSS Attack \15.Effect of XSS on Web Application.mp4
[e9e757e9e6d122db]
|
25,217,481 |
D2899DE6 |
Web Security [Video]\4.JavaScript and XSS Attack \17.Defend Against XSS Attack.mp4
[9a1284d18f611bb3]
|
9,797,693 |
4ACA775D |
Web Security [Video]\1.Introduction about Web Application Security\03.Discussion of the Different Types of Vulnerabilities in Web Applications (OWASP).mp4
[7bf46947de2c0e4e]
|
10,579,641 |
22785BB6 |
Web Security [Video]\1.Introduction about Web Application Security\04.Defining a Web Application Test Scope and Process.mp4
[73cfbb9251e2414d]
|
14,391,631 |
D98A7581 |
Web Security [Video]\1.Introduction about Web Application Security\01.The Course Overview.mp4
[46d71547698dfbae]
|
5,949,172 |
17FECDAA |
Web Security [Video]\1.Introduction about Web Application Security\02.Overview of the Web Application Security from a Penetration Tester's Perspective.mp4
[68465c03ba44ed0a]
|
5,850,515 |
50F40FD9 |
Web Security [Video]\1.Introduction about Web Application Security\05.Installation of Virtual Machines in System.mp4
[5ba254ec441dbfad]
|
48,335,079 |
A40A897E |
Web Security [Video]\2.Information Gathering\09.Tools to Spider a Website.mp4
[311a441cf4830d78]
|
26,338,386 |
824CFC34 |
Web Security [Video]\2.Information Gathering\07.Identifying the Machines and Operating Systems.mp4
[de0ec2a706c063a5]
|
23,102,322 |
2635CAF9 |
Web Security [Video]\2.Information Gathering\06.Discovering the Infrastructure of Web Applications.mp4
[de89f19a8e6910e3]
|
22,169,646 |
9AA21B9E |
Web Security [Video]\2.Information Gathering\08.Find Open Ports and Services of Web Applications.mp4
[ce0844320e400761]
|
26,246,563 |
48EFDB9C |
Web Security [Video]\3.Various Injection Attacks |
0 |
00000000 |
Web Security [Video]\5.CSRF and Logic Flaws |
0 |
00000000 |
Web Security [Video]\6.Avoiding_Detecting Other Vulnerabilities |
0 |
00000000 |
Web Security [Video]\4.JavaScript and XSS Attack |
0 |
00000000 |
Web Security [Video]\1.Introduction about Web Application Security |
0 |
00000000 |
Web Security [Video]\2.Information Gathering |
0 |
00000000 |
Web Security [Video] |
0 |
00000000 |
|
Total size: |
540,272,480 |
|
|