本站已收录 番号和无损神作磁力链接/BT种子 

[FreeCoursesOnline.Us] ethical-hacking-session-hijacking

种子简介

种子名称: [FreeCoursesOnline.Us] ethical-hacking-session-hijacking
文件类型: 视频
文件数目: 53个文件
文件大小: 568.28 MB
收录时间: 2017-12-26 14:27
已经下载: 3
资源热度: 140
最近下载: 2024-12-7 09:53

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:d78683f72fb974a511ace7c83477204e956d55c4&dn=[FreeCoursesOnline.Us] ethical-hacking-session-hijacking 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[FreeCoursesOnline.Us] ethical-hacking-session-hijacking.torrent
  • 00.Understanding-Session-Hijacking/00.Overview.mp43.87MB
  • 00.Understanding-Session-Hijacking/01.What-Is-Session-Hijacking.mp42.42MB
  • 00.Understanding-Session-Hijacking/02.Types-of-Session-Hijacking.mp44.63MB
  • 00.Understanding-Session-Hijacking/03.Attack-Vectors.mp45.36MB
  • 00.Understanding-Session-Hijacking/04.The-Impact-of-Session-Hijacking.mp48.79MB
  • 00.Understanding-Session-Hijacking/05.Session-Hijacking-and-the-OWASP-Top-10.mp413.52MB
  • 00.Understanding-Session-Hijacking/06.Summary.mp41.81MB
  • 01.Session-Persistence-in-Web-Applications/00.Overview.mp42.52MB
  • 01.Session-Persistence-in-Web-Applications/01.The-Stateless-Nature-of-HTTP.mp45.81MB
  • 01.Session-Persistence-in-Web-Applications/02.Persisting-State-Over-HTTP.mp48.1MB
  • 01.Session-Persistence-in-Web-Applications/03.Session-Persistence-in-Cookies.mp422.45MB
  • 01.Session-Persistence-in-Web-Applications/04.Session-Persistence-in-the-URL.mp415.73MB
  • 01.Session-Persistence-in-Web-Applications/05.Session-Persistence-in-Hidden-Form-Fields.mp45.8MB
  • 01.Session-Persistence-in-Web-Applications/06.Summary.mp43.95MB
  • 02.Hijacking-Sessions-in-Web-Applications/00.Overview.mp43.6MB
  • 02.Hijacking-Sessions-in-Web-Applications/01.Hijacking-Cookies-with-Cross-Site-Scripting.mp430.2MB
  • 02.Hijacking-Sessions-in-Web-Applications/02.Exposed-Cookie-Based-Session-IDs-in-Logs.mp415.8MB
  • 02.Hijacking-Sessions-in-Web-Applications/03.Exposed-URL-Based-Session-IDs-in-Logs.mp420.27MB
  • 02.Hijacking-Sessions-in-Web-Applications/04.Leaking-URL-Persisted-Sessions-in-the-Referrer.mp420.14MB
  • 02.Hijacking-Sessions-in-Web-Applications/05.Session-Sniffing.mp422.58MB
  • 02.Hijacking-Sessions-in-Web-Applications/06.Session-Fixation.mp419.04MB
  • 02.Hijacking-Sessions-in-Web-Applications/07.Brute-Forcing-Session-IDs.mp410.96MB
  • 02.Hijacking-Sessions-in-Web-Applications/08.Session-Donation.mp412.64MB
  • 02.Hijacking-Sessions-in-Web-Applications/09.Summary.mp44.8MB
  • 03.Network-and-Client-Level-Session-Hijacking/00.Overview.mp44.47MB
  • 03.Network-and-Client-Level-Session-Hijacking/01.Understanding-TCP.mp412.82MB
  • 03.Network-and-Client-Level-Session-Hijacking/02.Reviewing-the-Three-way-Handshake-in-Wireshark.mp432.7MB
  • 03.Network-and-Client-Level-Session-Hijacking/03.Generation-and-Predictability-of-TCP-Sequence-Numbers.mp415.85MB
  • 03.Network-and-Client-Level-Session-Hijacking/04.Blind-Hijacking.mp43.48MB
  • 03.Network-and-Client-Level-Session-Hijacking/05.Man-in-the-Middle-Session-Sniffing.mp43.09MB
  • 03.Network-and-Client-Level-Session-Hijacking/06.IP-Spoofing.mp42.07MB
  • 03.Network-and-Client-Level-Session-Hijacking/07.UDP-Hijacking.mp42.91MB
  • 03.Network-and-Client-Level-Session-Hijacking/08.Man-in-the-Browser-Attacks.mp44.37MB
  • 03.Network-and-Client-Level-Session-Hijacking/09.Network-Level-Session-Hijacking-in-the-Wild.mp44.42MB
  • 03.Network-and-Client-Level-Session-Hijacking/10.Summary.mp43.41MB
  • 04.Mitigating-the-Risk-of-Session-Hijacking/00.Overview.mp43.45MB
  • 04.Mitigating-the-Risk-of-Session-Hijacking/01.Use-Strong-Session-IDs.mp44.71MB
  • 04.Mitigating-the-Risk-of-Session-Hijacking/02.Keep-Session-IDs-Out-of-the-URL.mp43.59MB
  • 04.Mitigating-the-Risk-of-Session-Hijacking/03.Dont-Reuse-Session-ID-for-Auth.mp420.1MB
  • 04.Mitigating-the-Risk-of-Session-Hijacking/04.Always-Flag-Session-ID-Cookies-as-HTTP-Only.mp410.67MB
  • 04.Mitigating-the-Risk-of-Session-Hijacking/05.Use-Transport-Layer-Security.mp414.36MB
  • 04.Mitigating-the-Risk-of-Session-Hijacking/06.Always-Flag-Session-ID-Cookies-as-Secure.mp423.93MB
  • 04.Mitigating-the-Risk-of-Session-Hijacking/07.Session-Expiration-and-Using-Session-Cookies.mp414.77MB
  • 04.Mitigating-the-Risk-of-Session-Hijacking/08.Consider-Disabling-Sliding-Sessions.mp44.62MB
  • 04.Mitigating-the-Risk-of-Session-Hijacking/09.Encourage-Users-to-Log-Out.mp44.21MB
  • 04.Mitigating-the-Risk-of-Session-Hijacking/10.Re-authenticate-Before-Key-Actions.mp43.09MB
  • 04.Mitigating-the-Risk-of-Session-Hijacking/11.Summary.mp44.78MB
  • 05.Automating-Session-Hijack-Attacks/00.Overview.mp43.05MB
  • 05.Automating-Session-Hijack-Attacks/01.Manipulating-Session-IDs-with-OWASP-ZAP.mp417.65MB
  • 05.Automating-Session-Hijack-Attacks/02.Testing-Session-Token-Strength-with-Burp-Suite.mp430.26MB
  • 05.Automating-Session-Hijack-Attacks/03.Dynamic-Analysis-Testing-with-NetSparker.mp425.77MB
  • 05.Automating-Session-Hijack-Attacks/04.Other-Tools.mp421.81MB
  • 05.Automating-Session-Hijack-Attacks/05.Summary.mp43.11MB