"People must know the past to understand the present and face the future." ―Nellie McClung"
  • Anonymous
  • 2020-04-27 17:01:04
  • APPS
Compression is used

RELEASE >

ReScene version pyReScene Auto 0.7 ELOHiM File size CRC
Download
13,114
Stored files
2,451 2CCFDD5C
216 FEB19A58
RAR-files
e-pscpbac.rar 15,000,000 628C6F7E
e-pscpbac.r00 15,000,000 F9A0460C
e-pscpbac.r01 15,000,000 7E418162
e-pscpbac.r02 15,000,000 2A4DC8C2
e-pscpbac.r03 15,000,000 01CDF175
e-pscpbac.r04 15,000,000 9620511F
e-pscpbac.r05 15,000,000 1AEF37CD
e-pscpbac.r06 15,000,000 6B76A628
e-pscpbac.r07 7,288,238 3E182994

Total size: 127,288,238
Archived files
01. Course Overview\01. Course Overview.mp4 3,970,922 27E40B3B
01. Course Overview\01. Course Overview.srt 3,111 90E62B1E
02. Defining Access Controls\01. Access Control Basics.mp4 4,961,310 C74D5300
02. Defining Access Controls\01. Access Control Basics.srt 7,238 3467261F
02. Defining Access Controls\02. Authentication.mp4 4,178,799 CD729CD0
02. Defining Access Controls\02. Authentication.srt 5,088 65913ECB
02. Defining Access Controls\03. Example Authentication Flows.mp4 4,747,887 8F7B7575
02. Defining Access Controls\03. Example Authentication Flows.srt 5,349 DBB7E229
02. Defining Access Controls\04. Access Control Lists.mp4 2,648,176 EE4C4D89
02. Defining Access Controls\04. Access Control Lists.srt 3,386 8E9CBED9
02. Defining Access Controls\05. Types of Access Control.mp4 6,301,430 C1854188
02. Defining Access Controls\05. Types of Access Control.srt 9,582 1D970535
03. Forced Browsing to Find Hidden Functionality\01. Forced Browsing Overview.mp4 3,915,799 318AADF2
03. Forced Browsing to Find Hidden Functionality\01. Forced Browsing Overview.srt 5,240 3EABF6A3
03. Forced Browsing to Find Hidden Functionality\02. Demonstrating Forced Browsing.mp4 6,672,928 04C257B6
03. Forced Browsing to Find Hidden Functionality\02. Demonstrating Forced Browsing.srt 7,536 EC0267A0
03. Forced Browsing to Find Hidden Functionality\03. Forced Browsing Attacks.mp4 3,622,891 98C2EBA4
03. Forced Browsing to Find Hidden Functionality\03. Forced Browsing Attacks.srt 4,956 20769E3B
03. Forced Browsing to Find Hidden Functionality\04. Defense with Access Control Lists.mp4 7,264,164 703B62AB
03. Forced Browsing to Find Hidden Functionality\04. Defense with Access Control Lists.srt 7,759 66B8ABDF
03. Forced Browsing to Find Hidden Functionality\05. Defense with Role-based Access Control.mp4 4,362,371 8DDC0DB1
03. Forced Browsing to Find Hidden Functionality\05. Defense with Role-based Access Control.srt 5,642 900318DD
03. Forced Browsing to Find Hidden Functionality\06. Where to Put Access Checks.mp4 5,229,397 D66CE686
03. Forced Browsing to Find Hidden Functionality\06. Where to Put Access Checks.srt 6,738 BDEAE5D7
04. Traversing Directories for Unauthorized File Access\01. Directory Traversal Overview.mp4 4,028,276 31D3362E
04. Traversing Directories for Unauthorized File Access\01. Directory Traversal Overview.srt 4,794 EBE07FD9
04. Traversing Directories for Unauthorized File Access\02. Understanding Directory Traversal.mp4 10,348,861 D4C665C6
04. Traversing Directories for Unauthorized File Access\02. Understanding Directory Traversal.srt 5,905 9B64DC19
04. Traversing Directories for Unauthorized File Access\03. Attacking a Directory Traversal Vulnerability.mp4 4,844,723 2DA87945
04. Traversing Directories for Unauthorized File Access\03. Attacking a Directory Traversal Vulnerability.srt 6,687 E63E20AF
04. Traversing Directories for Unauthorized File Access\04. Defensive Checks.mp4 5,176,383 AE341209
04. Traversing Directories for Unauthorized File Access\04. Defensive Checks.srt 7,828 8D605888
04. Traversing Directories for Unauthorized File Access\05. Defensive Code.mp4 3,835,682 87FD85E4
04. Traversing Directories for Unauthorized File Access\05. Defensive Code.srt 5,663 913E61E2
05. Manipulating Parameters to Alter Results\01. Parameter Manipulation Overview.mp4 2,797,797 AAC18B05
05. Manipulating Parameters to Alter Results\01. Parameter Manipulation Overview.srt 3,752 B141AC38
05. Manipulating Parameters to Alter Results\02. Understanding Parameter Manipulation.mp4 4,602,599 9EA2A5F3
05. Manipulating Parameters to Alter Results\02. Understanding Parameter Manipulation.srt 6,325 E2647311
05. Manipulating Parameters to Alter Results\03. Demonstration of Manipulated Parameters.mp4 15,230,388 36AFFA75
05. Manipulating Parameters to Alter Results\03. Demonstration of Manipulated Parameters.srt 9,437 2B2358A8
05. Manipulating Parameters to Alter Results\04. Seeing Where Parameters Can Be Altered.mp4 3,438,379 1B73A182
05. Manipulating Parameters to Alter Results\04. Seeing Where Parameters Can Be Altered.srt 4,537 7949D1C7
05. Manipulating Parameters to Alter Results\05. Parameter Validation Attacks and Basic Defense.mp4 6,377,794 784BEB30
05. Manipulating Parameters to Alter Results\05. Parameter Validation Attacks and Basic Defense.srt 8,339 A836517D
05. Manipulating Parameters to Alter Results\06. Field Access Attacks.mp4 5,651,541 FF58C73D
05. Manipulating Parameters to Alter Results\06. Field Access Attacks.srt 7,896 836EEC3D
05. Manipulating Parameters to Alter Results\07. Unauthorized Field Access Defense.mp4 8,113,402 17A9B018
05. Manipulating Parameters to Alter Results\07. Unauthorized Field Access Defense.srt 9,820 18498C12
06. Finding Insecure Direct Object References (IDOR)\01. IDOR Overview.mp4 5,219,460 12D4F2B5
06. Finding Insecure Direct Object References (IDOR)\01. IDOR Overview.srt 7,254 35F34E16
06. Finding Insecure Direct Object References (IDOR)\02. Demonstrating an IDOR Attack.mp4 8,190,749 09AF6226
06. Finding Insecure Direct Object References (IDOR)\02. Demonstrating an IDOR Attack.srt 5,909 787F12D4
06. Finding Insecure Direct Object References (IDOR)\03. Understanding the IDOR Attack.mp4 5,377,739 4DCB6E53
06. Finding Insecure Direct Object References (IDOR)\03. Understanding the IDOR Attack.srt 6,676 CEFE9DA4
06. Finding Insecure Direct Object References (IDOR)\04. Defending from IDOR Attacks.mp4 7,916,923 8F3F1741
06. Finding Insecure Direct Object References (IDOR)\04. Defending from IDOR Attacks.srt 8,930 36685D9F
07. Guiding Principles for Access Controls\01. Guiding Principles Overview.mp4 3,828,514 87A0BC06
07. Guiding Principles for Access Controls\01. Guiding Principles Overview.srt 5,093 FCBADFB5
07. Guiding Principles for Access Controls\02. Securing Code.mp4 4,876,557 2FF8F9FD
07. Guiding Principles for Access Controls\02. Securing Code.srt 5,390 E511DEE0
07. Guiding Principles for Access Controls\03. Securing Code with Security Principles.mp4 9,586,542 49CDB4F8
07. Guiding Principles for Access Controls\03. Securing Code with Security Principles.srt 11,383 6C02D970
07. Guiding Principles for Access Controls\04. Securing Code with Coding Principles.mp4 7,371,875 7519155F
07. Guiding Principles for Access Controls\04. Securing Code with Coding Principles.srt 9,109 05829BCC
07. Guiding Principles for Access Controls\05. Summary of Principles.mp4 2,390,640 CA7F6F71
07. Guiding Principles for Access Controls\05. Summary of Principles.srt 3,199 321114E4
Exercise Files\02\defining-access-controls-slides.pdf 1,056,444 B4DC8086
Exercise Files\03\forced-browsing-to-find-hidden-functionality-slides.pdf 1,058,351 9234EDAB
Exercise Files\04\traversing-directories-for-unauthorized-file-access-slides.pdf 931,944 A3A4668F
Exercise Files\05\manipulating-parameters-to-alter-results-slides.pdf 1,200,640 B5857AA8
Exercise Files\06\finding-insecure-direct-object-references-idor-slides.pdf 733,738 251CE1C7
Exercise Files\07\guiding-principles-for-access-controls-slides.pdf 707,051 14CCEDC1
Exercise Files\02 0 00000000
Exercise Files\03 0 00000000
Exercise Files\04 0 00000000
Exercise Files\05 0 00000000
Exercise Files\06 0 00000000
Exercise Files\07 0 00000000
01. Course Overview 0 00000000
02. Defining Access Controls 0 00000000
03. Forced Browsing to Find Hidden Functionality 0 00000000
04. Traversing Directories for Unauthorized File Access 0 00000000
05. Manipulating Parameters to Alter Results 0 00000000
06. Finding Insecure Direct Object References (IDOR) 0 00000000
07. Guiding Principles for Access Controls 0 00000000
Exercise Files 0 00000000

Total size: 192,984,617
RAR Recovery
Not Present
Labels APPS