种子简介
种子名称:
Ethical Hacking with JavaScript
文件类型:
视频
文件数目:
38个文件
文件大小:
1.49 GB
收录时间:
2023-9-3 23:51
已经下载:
3次
资源热度:
93
最近下载:
2024-12-10 10:12
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:63927a89de70a8644afe98a89a90b5d411029457&dn=Ethical Hacking with JavaScript
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Ethical Hacking with JavaScript.torrent
9. Working with Files, Data, and the Operating System/3. Accessing the File and Operating Systems.mp484.35MB
1. Introduction/1. Introduction and Course Contents.mp432.42MB
1. Introduction/2. How Does This Help My Career.mp410.08MB
1. Introduction/3. Ethics.mp44.57MB
2. JavaScript Refresher/1. Basic Operations.mp456.14MB
2. JavaScript Refresher/2. Events.mp420.21MB
2. JavaScript Refresher/3. Document Object Model.mp438.33MB
3. Cross Site Scripting (XSS) Refresher/1. Reflected XSS.mp429.34MB
3. Cross Site Scripting (XSS) Refresher/2. Persisted XSS.mp418.76MB
3. Cross Site Scripting (XSS) Refresher/3. DOM-based XSS.mp415.59MB
4. Building a Lab/1. DVWA for Target Practice.mp426.23MB
4. Building a Lab/2. Encoding Data with Burp Suite.mp434.98MB
4. Building a Lab/3. Python Web Server.mp418.59MB
4. Building a Lab/4. Netcat Listener.mp427.53MB
5. Penetration Testing Approach/1. Approach and Tools.mp426.67MB
6. Altering Content/1. Altering HTML Content for Web Site Defacement.mp448.16MB
6. Altering Content/2. Setting Up a Social Engineering Attack.mp464.67MB
6. Altering Content/3. Tampering with Links.mp430.82MB
7. Stealing Credentials and Cookies/1. Disclosing Cookie Content.mp423.19MB
7. Stealing Credentials and Cookies/2. Stealing Cookies.mp434.52MB
7. Stealing Credentials and Cookies/3. Stealing Credentials.mp440.42MB
7. Stealing Credentials and Cookies/4. Obtaining Additional Form Data.mp463.98MB
7. Stealing Credentials and Cookies/5. Hijacking Knowledge-Based Authentication.mp464.37MB
8. Tampering with User Interactions/1. Spear Phishing to Detect the User's Operating System.mp434.96MB
8. Tampering with User Interactions/2. Browser Detection.mp441.56MB
8. Tampering with User Interactions/3. Capturing Mouse Activity.mp434.68MB
8. Tampering with User Interactions/4. Key Logging.mp445.99MB
8. Tampering with User Interactions/5. Making Fraudulent Posts.mp482.87MB
8. Tampering with User Interactions/6. From Reflected XSS to Persisted XSS.mp473.22MB
8. Tampering with User Interactions/7. Changing Passwords with a CSRF Weakness.mp466.88MB
9. Working with Files, Data, and the Operating System/1. Including Remote JavaScript Files.mp450.5MB
9. Working with Files, Data, and the Operating System/2. Obtaining the Passwd File.mp476.41MB
9. Working with Files, Data, and the Operating System/4. Uploading a Web Shell.mp473.04MB
10. Defensive Measures/1. OWASP Top Ten.mp423.48MB
10. Defensive Measures/2. Encryption and Cookie Protection.mp413.01MB
10. Defensive Measures/3. Secure Design and Access Control.mp433.54MB
10. Defensive Measures/4. Untrusted Input.mp443.23MB
11. Conclusion/1. Summary.mp420.69MB