RAR-files |
e-ptactiaptp.rar |
15,000,000 |
5B9780DA |
e-ptactiaptp.r00 |
15,000,000 |
0B2819C3 |
e-ptactiaptp.r01 |
15,000,000 |
5B6F7120 |
e-ptactiaptp.r02 |
15,000,000 |
BFE9D3FC |
e-ptactiaptp.r03 |
15,000,000 |
0A0502D1 |
e-ptactiaptp.r04 |
15,000,000 |
805FB9E1 |
e-ptactiaptp.r05 |
15,000,000 |
E9D151B9 |
e-ptactiaptp.r06 |
15,000,000 |
86160BF7 |
e-ptactiaptp.r07 |
2,426,678 |
4704B04C |
|
Total size: |
122,426,678 |
|
|
Archived
files |
01. Course Overview\01. Course Overview.mp4 |
4,471,564 |
09F4AE0E |
01. Course Overview\01. Course Overview.srt |
3,994 |
054D5F74 |
02. Examining Common Web-application Vulnerabilities\01. Understanding What You'll Learn.mp4 |
3,973,431 |
E8DED943 |
02. Examining Common Web-application Vulnerabilities\01. Understanding What You'll Learn.srt |
3,533 |
03C7955B |
02. Examining Common Web-application Vulnerabilities\02. Examining Common Web-application Vulnerabilities.mp4 |
5,682,043 |
A8396CEB |
02. Examining Common Web-application Vulnerabilities\02. Examining Common Web-application Vulnerabilities.srt |
4,776 |
D017D708 |
02. Examining Common Web-application Vulnerabilities\03. Misconfigurations.mp4 |
13,426,128 |
7CD666B4 |
02. Examining Common Web-application Vulnerabilities\03. Misconfigurations.srt |
12,400 |
DE76AED7 |
02. Examining Common Web-application Vulnerabilities\04. Let's ZAP a Web App!.mp4 |
28,335,997 |
A7781AAC |
02. Examining Common Web-application Vulnerabilities\04. Let's ZAP a Web App!.srt |
11,411 |
D8B9A09C |
03. Executing Authentication and Authorization Attacks\01. Authentication Attacks.mp4 |
7,396,650 |
0014BBEF |
03. Executing Authentication and Authorization Attacks\01. Authentication Attacks.srt |
8,301 |
8C1D9756 |
03. Executing Authentication and Authorization Attacks\02. Authorization Attacks.mp4 |
6,509,063 |
F3F9B48A |
03. Executing Authentication and Authorization Attacks\02. Authorization Attacks.srt |
7,436 |
B2384F82 |
04. Exploring the Injection Attacks\01. Code Command Injection.mp4 |
3,483,270 |
5BDA478E |
04. Exploring the Injection Attacks\01. Code Command Injection.srt |
4,258 |
AD0EFECE |
04. Exploring the Injection Attacks\02. SQL Injection.mp4 |
8,018,658 |
07E6341E |
04. Exploring the Injection Attacks\02. SQL Injection.srt |
8,153 |
F7BE5443 |
04. Exploring the Injection Attacks\03. Demo. SQL Injection Union.mp4 |
22,545,290 |
35D4EB61 |
04. Exploring the Injection Attacks\03. Demo. SQL Injection Union.srt |
10,841 |
6A5B1DFA |
04. Exploring the Injection Attacks\04. HTML Injection.mp4 |
2,478,442 |
8EB88ACC |
04. Exploring the Injection Attacks\04. HTML Injection.srt |
2,878 |
2C4FFFC0 |
05. Showing Further Attack Methods\01. XSS Attacks.mp4 |
8,031,619 |
B813D353 |
05. Showing Further Attack Methods\01. XSS Attacks.srt |
7,371 |
E0AD48D0 |
05. Showing Further Attack Methods\02. XSRF Attacks.mp4 |
4,856,980 |
B823DEB8 |
05. Showing Further Attack Methods\02. XSRF Attacks.srt |
4,951 |
CD668506 |
05. Showing Further Attack Methods\03. Clickjacking, File Inclusion, and Web Shells.mp4 |
11,865,437 |
96866B06 |
05. Showing Further Attack Methods\03. Clickjacking, File Inclusion, and Web Shells.srt |
12,943 |
113B5E2E |
06. Examining Source Code and Compiled Apps\01. Examining Source Code and Compiled Apps.mp4 |
5,166,186 |
D506F696 |
06. Examining Source Code and Compiled Apps\01. Examining Source Code and Compiled Apps.srt |
6,776 |
DC19A1CF |
06. Examining Source Code and Compiled Apps\02. Reverse Engineering.mp4 |
9,757,948 |
033F4E26 |
06. Examining Source Code and Compiled Apps\02. Reverse Engineering.srt |
11,506 |
2A65FC73 |
Exercise Files\02\examining-common-web-application-vulnerabilities-slides.pdf |
991,713 |
9C8A6B18 |
Exercise Files\03\executing-authentication-and-authorization-attacks-slides.pdf |
557,110 |
9ABECF3C |
Exercise Files\04\exploring-the-injection-attacks-slides.pdf |
574,502 |
BC475BB7 |
Exercise Files\05\showing-further-attack-methods-slides.pdf |
938,831 |
E7096FA4 |
Exercise Files\06\examining-source-code-and-compiled-apps-slides.pdf |
600,339 |
71350C3C |
Exercise Files\02 |
0 |
00000000 |
Exercise Files\03 |
0 |
00000000 |
Exercise Files\04 |
0 |
00000000 |
Exercise Files\05 |
0 |
00000000 |
Exercise Files\06 |
0 |
00000000 |
01. Course Overview |
0 |
00000000 |
02. Examining Common Web-application Vulnerabilities |
0 |
00000000 |
03. Executing Authentication and Authorization Attacks |
0 |
00000000 |
04. Exploring the Injection Attacks |
0 |
00000000 |
05. Showing Further Attack Methods |
0 |
00000000 |
06. Examining Source Code and Compiled Apps |
0 |
00000000 |
Exercise Files |
0 |
00000000 |
|
Total size: |
149,782,729 |
|
|