RAR-files |
e-pscpbac.rar |
15,000,000 |
628C6F7E |
e-pscpbac.r00 |
15,000,000 |
F9A0460C |
e-pscpbac.r01 |
15,000,000 |
7E418162 |
e-pscpbac.r02 |
15,000,000 |
2A4DC8C2 |
e-pscpbac.r03 |
15,000,000 |
01CDF175 |
e-pscpbac.r04 |
15,000,000 |
9620511F |
e-pscpbac.r05 |
15,000,000 |
1AEF37CD |
e-pscpbac.r06 |
15,000,000 |
6B76A628 |
e-pscpbac.r07 |
7,288,238 |
3E182994 |
|
Total size: |
127,288,238 |
|
|
Archived
files |
01. Course Overview\01. Course Overview.mp4 |
3,970,922 |
27E40B3B |
01. Course Overview\01. Course Overview.srt |
3,111 |
90E62B1E |
02. Defining Access Controls\01. Access Control Basics.mp4 |
4,961,310 |
C74D5300 |
02. Defining Access Controls\01. Access Control Basics.srt |
7,238 |
3467261F |
02. Defining Access Controls\02. Authentication.mp4 |
4,178,799 |
CD729CD0 |
02. Defining Access Controls\02. Authentication.srt |
5,088 |
65913ECB |
02. Defining Access Controls\03. Example Authentication Flows.mp4 |
4,747,887 |
8F7B7575 |
02. Defining Access Controls\03. Example Authentication Flows.srt |
5,349 |
DBB7E229 |
02. Defining Access Controls\04. Access Control Lists.mp4 |
2,648,176 |
EE4C4D89 |
02. Defining Access Controls\04. Access Control Lists.srt |
3,386 |
8E9CBED9 |
02. Defining Access Controls\05. Types of Access Control.mp4 |
6,301,430 |
C1854188 |
02. Defining Access Controls\05. Types of Access Control.srt |
9,582 |
1D970535 |
03. Forced Browsing to Find Hidden Functionality\01. Forced Browsing Overview.mp4 |
3,915,799 |
318AADF2 |
03. Forced Browsing to Find Hidden Functionality\01. Forced Browsing Overview.srt |
5,240 |
3EABF6A3 |
03. Forced Browsing to Find Hidden Functionality\02. Demonstrating Forced Browsing.mp4 |
6,672,928 |
04C257B6 |
03. Forced Browsing to Find Hidden Functionality\02. Demonstrating Forced Browsing.srt |
7,536 |
EC0267A0 |
03. Forced Browsing to Find Hidden Functionality\03. Forced Browsing Attacks.mp4 |
3,622,891 |
98C2EBA4 |
03. Forced Browsing to Find Hidden Functionality\03. Forced Browsing Attacks.srt |
4,956 |
20769E3B |
03. Forced Browsing to Find Hidden Functionality\04. Defense with Access Control Lists.mp4 |
7,264,164 |
703B62AB |
03. Forced Browsing to Find Hidden Functionality\04. Defense with Access Control Lists.srt |
7,759 |
66B8ABDF |
03. Forced Browsing to Find Hidden Functionality\05. Defense with Role-based Access Control.mp4 |
4,362,371 |
8DDC0DB1 |
03. Forced Browsing to Find Hidden Functionality\05. Defense with Role-based Access Control.srt |
5,642 |
900318DD |
03. Forced Browsing to Find Hidden Functionality\06. Where to Put Access Checks.mp4 |
5,229,397 |
D66CE686 |
03. Forced Browsing to Find Hidden Functionality\06. Where to Put Access Checks.srt |
6,738 |
BDEAE5D7 |
04. Traversing Directories for Unauthorized File Access\01. Directory Traversal Overview.mp4 |
4,028,276 |
31D3362E |
04. Traversing Directories for Unauthorized File Access\01. Directory Traversal Overview.srt |
4,794 |
EBE07FD9 |
04. Traversing Directories for Unauthorized File Access\02. Understanding Directory Traversal.mp4 |
10,348,861 |
D4C665C6 |
04. Traversing Directories for Unauthorized File Access\02. Understanding Directory Traversal.srt |
5,905 |
9B64DC19 |
04. Traversing Directories for Unauthorized File Access\03. Attacking a Directory Traversal Vulnerability.mp4 |
4,844,723 |
2DA87945 |
04. Traversing Directories for Unauthorized File Access\03. Attacking a Directory Traversal Vulnerability.srt |
6,687 |
E63E20AF |
04. Traversing Directories for Unauthorized File Access\04. Defensive Checks.mp4 |
5,176,383 |
AE341209 |
04. Traversing Directories for Unauthorized File Access\04. Defensive Checks.srt |
7,828 |
8D605888 |
04. Traversing Directories for Unauthorized File Access\05. Defensive Code.mp4 |
3,835,682 |
87FD85E4 |
04. Traversing Directories for Unauthorized File Access\05. Defensive Code.srt |
5,663 |
913E61E2 |
05. Manipulating Parameters to Alter Results\01. Parameter Manipulation Overview.mp4 |
2,797,797 |
AAC18B05 |
05. Manipulating Parameters to Alter Results\01. Parameter Manipulation Overview.srt |
3,752 |
B141AC38 |
05. Manipulating Parameters to Alter Results\02. Understanding Parameter Manipulation.mp4 |
4,602,599 |
9EA2A5F3 |
05. Manipulating Parameters to Alter Results\02. Understanding Parameter Manipulation.srt |
6,325 |
E2647311 |
05. Manipulating Parameters to Alter Results\03. Demonstration of Manipulated Parameters.mp4 |
15,230,388 |
36AFFA75 |
05. Manipulating Parameters to Alter Results\03. Demonstration of Manipulated Parameters.srt |
9,437 |
2B2358A8 |
05. Manipulating Parameters to Alter Results\04. Seeing Where Parameters Can Be Altered.mp4 |
3,438,379 |
1B73A182 |
05. Manipulating Parameters to Alter Results\04. Seeing Where Parameters Can Be Altered.srt |
4,537 |
7949D1C7 |
05. Manipulating Parameters to Alter Results\05. Parameter Validation Attacks and Basic Defense.mp4 |
6,377,794 |
784BEB30 |
05. Manipulating Parameters to Alter Results\05. Parameter Validation Attacks and Basic Defense.srt |
8,339 |
A836517D |
05. Manipulating Parameters to Alter Results\06. Field Access Attacks.mp4 |
5,651,541 |
FF58C73D |
05. Manipulating Parameters to Alter Results\06. Field Access Attacks.srt |
7,896 |
836EEC3D |
05. Manipulating Parameters to Alter Results\07. Unauthorized Field Access Defense.mp4 |
8,113,402 |
17A9B018 |
05. Manipulating Parameters to Alter Results\07. Unauthorized Field Access Defense.srt |
9,820 |
18498C12 |
06. Finding Insecure Direct Object References (IDOR)\01. IDOR Overview.mp4 |
5,219,460 |
12D4F2B5 |
06. Finding Insecure Direct Object References (IDOR)\01. IDOR Overview.srt |
7,254 |
35F34E16 |
06. Finding Insecure Direct Object References (IDOR)\02. Demonstrating an IDOR Attack.mp4 |
8,190,749 |
09AF6226 |
06. Finding Insecure Direct Object References (IDOR)\02. Demonstrating an IDOR Attack.srt |
5,909 |
787F12D4 |
06. Finding Insecure Direct Object References (IDOR)\03. Understanding the IDOR Attack.mp4 |
5,377,739 |
4DCB6E53 |
06. Finding Insecure Direct Object References (IDOR)\03. Understanding the IDOR Attack.srt |
6,676 |
CEFE9DA4 |
06. Finding Insecure Direct Object References (IDOR)\04. Defending from IDOR Attacks.mp4 |
7,916,923 |
8F3F1741 |
06. Finding Insecure Direct Object References (IDOR)\04. Defending from IDOR Attacks.srt |
8,930 |
36685D9F |
07. Guiding Principles for Access Controls\01. Guiding Principles Overview.mp4 |
3,828,514 |
87A0BC06 |
07. Guiding Principles for Access Controls\01. Guiding Principles Overview.srt |
5,093 |
FCBADFB5 |
07. Guiding Principles for Access Controls\02. Securing Code.mp4 |
4,876,557 |
2FF8F9FD |
07. Guiding Principles for Access Controls\02. Securing Code.srt |
5,390 |
E511DEE0 |
07. Guiding Principles for Access Controls\03. Securing Code with Security Principles.mp4 |
9,586,542 |
49CDB4F8 |
07. Guiding Principles for Access Controls\03. Securing Code with Security Principles.srt |
11,383 |
6C02D970 |
07. Guiding Principles for Access Controls\04. Securing Code with Coding Principles.mp4 |
7,371,875 |
7519155F |
07. Guiding Principles for Access Controls\04. Securing Code with Coding Principles.srt |
9,109 |
05829BCC |
07. Guiding Principles for Access Controls\05. Summary of Principles.mp4 |
2,390,640 |
CA7F6F71 |
07. Guiding Principles for Access Controls\05. Summary of Principles.srt |
3,199 |
321114E4 |
Exercise Files\02\defining-access-controls-slides.pdf |
1,056,444 |
B4DC8086 |
Exercise Files\03\forced-browsing-to-find-hidden-functionality-slides.pdf |
1,058,351 |
9234EDAB |
Exercise Files\04\traversing-directories-for-unauthorized-file-access-slides.pdf |
931,944 |
A3A4668F |
Exercise Files\05\manipulating-parameters-to-alter-results-slides.pdf |
1,200,640 |
B5857AA8 |
Exercise Files\06\finding-insecure-direct-object-references-idor-slides.pdf |
733,738 |
251CE1C7 |
Exercise Files\07\guiding-principles-for-access-controls-slides.pdf |
707,051 |
14CCEDC1 |
Exercise Files\02 |
0 |
00000000 |
Exercise Files\03 |
0 |
00000000 |
Exercise Files\04 |
0 |
00000000 |
Exercise Files\05 |
0 |
00000000 |
Exercise Files\06 |
0 |
00000000 |
Exercise Files\07 |
0 |
00000000 |
01. Course Overview |
0 |
00000000 |
02. Defining Access Controls |
0 |
00000000 |
03. Forced Browsing to Find Hidden Functionality |
0 |
00000000 |
04. Traversing Directories for Unauthorized File Access |
0 |
00000000 |
05. Manipulating Parameters to Alter Results |
0 |
00000000 |
06. Finding Insecure Direct Object References (IDOR) |
0 |
00000000 |
07. Guiding Principles for Access Controls |
0 |
00000000 |
Exercise Files |
0 |
00000000 |
|
Total size: |
192,984,617 |
|
|