RAR-files |
pwcs-bfti-xqzt.rar |
50,000,000 |
703A06C2 |
pwcs-bfti-xqzt.r00 |
50,000,000 |
394261AD |
pwcs-bfti-xqzt.r01 |
50,000,000 |
00E7D8A2 |
pwcs-bfti-xqzt.r02 |
50,000,000 |
10EA9B21 |
pwcs-bfti-xqzt.r03 |
50,000,000 |
69F61590 |
pwcs-bfti-xqzt.r04 |
50,000,000 |
6E4AC1DC |
pwcs-bfti-xqzt.r05 |
50,000,000 |
2A7D46A5 |
pwcs-bfti-xqzt.r06 |
50,000,000 |
AB9ADD38 |
pwcs-bfti-xqzt.r07 |
50,000,000 |
259C93B3 |
pwcs-bfti-xqzt.r08 |
50,000,000 |
4CC4B1BF |
pwcs-bfti-xqzt.r09 |
50,000,000 |
3E77FF6B |
pwcs-bfti-xqzt.r10 |
26,069,257 |
E71C9D28 |
|
Total size: |
576,069,257 |
|
|
Archived
files |
1 - Course Overview \01 - Course Overview.mp4
[8ed3676203d9a3f7]
|
5,511,708 |
30AA7924 |
7 - Regressing Security Vulnerabilities with Standalone Scripts \32 - OWASP ZAP and Security Regression Testing.mp4
[e65f9cbbc8c23a64]
|
2,791,157 |
24E4CB09 |
7 - Regressing Security Vulnerabilities with Standalone Scripts \34 - Regressing an Unvalidated Redirect Vulnerability.mp4
[434c292a5c94bcf5]
|
22,353,724 |
8AE7754E |
7 - Regressing Security Vulnerabilities with Standalone Scripts \36 - HTTP Sender Script to Merge Multiple Cookie Headers.mp4
[4bab86d7fab9ed2c]
|
31,615,469 |
F0AD5E71 |
7 - Regressing Security Vulnerabilities with Standalone Scripts \35 - Running Scripts from Command Line with Standalone ZEST Runner .mp4
[ff840851a0cf062c]
|
13,580,208 |
0269635E |
7 - Regressing Security Vulnerabilities with Standalone Scripts \33 - Regressing an XSS Vulnerability.mp4
[a029d214c3bbfac5]
|
38,254,711 |
6989CC98 |
7 - Regressing Security Vulnerabilities with Standalone Scripts \37 - Running Standalone ZEST Scripts.mp4
[f19a74fb03bb2857]
|
2,735,114 |
F0BDA0B8 |
7 - Regressing Security Vulnerabilities with Standalone Scripts \30 - Module Overview.mp4
[c43586a8ea0541e8]
|
1,891,864 |
062D422D |
7 - Regressing Security Vulnerabilities with Standalone Scripts \31 - Extreme Programming Rule and a Security Regression Test.mp4
[c7a24a3b033d5c62]
|
4,653,547 |
22166869 |
6 - Generating Custom Payloads for Fuzzing Operations \25 - Inbuilt Fuzzer Payload Generators in OWASP ZAP.mp4
[4825961f80731807]
|
14,681,241 |
851C8AD1 |
6 - Generating Custom Payloads for Fuzzing Operations \29 - Summary.mp4
[e657d9e133f55c69]
|
3,168,382 |
40471A9B |
6 - Generating Custom Payloads for Fuzzing Operations \28 - Combining Multiple Payload Generators for Fuzzing.mp4
[927239b095f2c3f8]
|
35,293,460 |
8A4693E0 |
6 - Generating Custom Payloads for Fuzzing Operations \26 - Anatomy of a Payload Generator Script.mp4
[4c6410970c6ec0a1]
|
3,889,589 |
87984DA2 |
6 - Generating Custom Payloads for Fuzzing Operations \24 - Insecure Direct Object References Vulnerability.mp4
[6fe4004c8d3c0133]
|
6,205,770 |
26C40CCE |
6 - Generating Custom Payloads for Fuzzing Operations \27 - Writing a Fuzzer Payload Generator Script.mp4
[f434255c1cf6a9f]
|
13,442,480 |
E361D679 |
2 - Preparing the OWASP ZAP Scripting Environment \04 - Setting up the Browser, Proxies, and Certificates.mp4
[601c59f2a30460e6]
|
27,574,544 |
D3FCFE8F |
2 - Preparing the OWASP ZAP Scripting Environment \02 - The Need for Scripting in OWASP ZAP.mp4
[fbf188ab65046c8e]
|
3,744,780 |
611F32F1 |
2 - Preparing the OWASP ZAP Scripting Environment \05 - Preparing the Scripting Add-ons.mp4
[96bb2b3b3c3146ee]
|
15,284,305 |
6B579FC6 |
2 - Preparing the OWASP ZAP Scripting Environment \03 - Supported Scripting Types and Languages.mp4
[f716c9096bde74cf]
|
7,143,121 |
F74CC644 |
3 - Tampering the Requests and Responses with Proxy Scripts \11 - Summary.mp4
[2f0d0c5cd78ed804]
|
3,330,048 |
9B7840BD |
3 - Tampering the Requests and Responses with Proxy Scripts \06 - The Power of Being the Man in the Middle.mp4
[b93e7a2ba144a684]
|
5,028,199 |
58274446 |
3 - Tampering the Requests and Responses with Proxy Scripts \09 - Writing a Proxy Script That Modifies HTTP Responses.mp4
[4a6c4377ed44ec62]
|
25,812,529 |
9B6F9FDC |
3 - Tampering the Requests and Responses with Proxy Scripts \07 - Insecure Cache Configuration Vulnerability.mp4
[8cc95a10dad24770]
|
7,563,293 |
F8F54A37 |
3 - Tampering the Requests and Responses with Proxy Scripts \08 - The Proxy Script and Its Trigger.mp4
[f827fcc0901047]
|
17,678,113 |
5CCBC9D6 |
3 - Tampering the Requests and Responses with Proxy Scripts \10 - Saving and Loading Scripts and ZEST Statements.mp4
[9b8de0801a2aaa62]
|
10,644,887 |
28D7B6D9 |
8 - Wrap up and Summary \41 - Key Takeaways .mp4
[6034ef98ee289913]
|
2,569,159 |
CEE5A373 |
8 - Wrap up and Summary \39 - Loading Scripts through config.xml and ZAP APIs.mp4
[af2b2f893c018e2b]
|
1,634,075 |
1F11F387 |
8 - Wrap up and Summary \38 - Debugging Tips.mp4
[92873ca7a5b26a2c]
|
4,186,645 |
64CD0742 |
8 - Wrap up and Summary \40 - Staying Abreast of OWASP ZAP and Reaching out for Help.mp4
[73266f9952567fa6]
|
3,575,386 |
148FEC8C |
4 - Identifying Contextual and Custom Vulnerabilities through Scanner Scripts \13 - Information Exposure Vulnerability.mp4
[2dbba23ef92f4148]
|
13,991,649 |
554D4848 |
4 - Identifying Contextual and Custom Vulnerabilities through Scanner Scripts \17 - Running an Active Scan Script to Detect Insecure HTTP Verbs.mp4
[114bc6783d6baf9]
|
35,214,180 |
CD6FD706 |
4 - Identifying Contextual and Custom Vulnerabilities through Scanner Scripts \16 - Raising Alerts with Different Arguments.mp4
[1a15877f3f0bd023]
|
24,874,294 |
2B146519 |
4 - Identifying Contextual and Custom Vulnerabilities through Scanner Scripts \14 - Default Active Scan and Passive Scan Rules.mp4
[ae4b3c399b194630]
|
12,084,415 |
C761D59B |
4 - Identifying Contextual and Custom Vulnerabilities through Scanner Scripts \12 - Three Important Components of Web Scanning.mp4
[b2868dcfa5248403]
|
5,885,841 |
E7333BCD |
4 - Identifying Contextual and Custom Vulnerabilities through Scanner Scripts \15 - Writing a Passive Scan Script to Find Leaking IBANs.mp4
[324c4c27f8f90b44]
|
26,309,631 |
5B84D412 |
4 - Identifying Contextual and Custom Vulnerabilities through Scanner Scripts \18 - Summary.mp4
[b0b0c190eb269d68]
|
3,278,675 |
7476D439 |
writing-custom-scripts-owasp-zed-attack-proxy.zip |
3,966,718 |
84FB05E5 |
5 - Scripting Complicated Authentication Scenarios \22 - Extracting Tokens from HTTP Message Data to Script Variables.mp4
[a58120ff9fe2d009]
|
32,697,514 |
6213F977 |
5 - Scripting Complicated Authentication Scenarios \19 - Supported Authentication Schemes in OWASP ZAP.mp4
[d809d630bc8dbef0]
|
4,582,958 |
F45AF5E8 |
5 - Scripting Complicated Authentication Scenarios \23 - Summary.mp4
[700d3eec8f90ff9]
|
2,118,874 |
D5A900B2 |
5 - Scripting Complicated Authentication Scenarios \20 - The Need for Authenticated Scanning.mp4
[388304dacd2c32a0]
|
25,455,539 |
F3E5E799 |
5 - Scripting Complicated Authentication Scenarios \21 - Scripting an Authentication Sequence with ZEST.mp4
[e937e302149197fa]
|
49,763,011 |
6CF8AB46 |
1 - Course Overview |
0 |
00000000 |
7 - Regressing Security Vulnerabilities with Standalone Scripts |
0 |
00000000 |
6 - Generating Custom Payloads for Fuzzing Operations |
0 |
00000000 |
2 - Preparing the OWASP ZAP Scripting Environment |
0 |
00000000 |
3 - Tampering the Requests and Responses with Proxy Scripts |
0 |
00000000 |
8 - Wrap up and Summary |
0 |
00000000 |
4 - Identifying Contextual and Custom Vulnerabilities through Scanner Scripts |
0 |
00000000 |
5 - Scripting Complicated Authentication Scenarios |
0 |
00000000 |
|
Total size: |
576,060,807 |
|
|