zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[GigaCourse.Com] Udemy - Learn Bug Bounty Hunting & Web Security Testing From Scratch
magnet:?xt=urn:btih:4673b14dfb74d42b855246f27968227fcb11e33f&dn=[GigaCourse.Com] Udemy - Learn Bug Bounty Hunting & Web Security Testing From Scratch
磁力链接详情
Hash值:
4673b14dfb74d42b855246f27968227fcb11e33f
点击数:
184
文件大小:
7.89 GB
文件数量:
95
创建日期:
2023-9-7 06:30
最后访问:
2024-12-25 14:23
访问标签:
GigaCourse
Com
Udemy
-
Learn
Bug
Bounty
Hunting
&
Web
Security
Testing
From
Scratch
文件列表详情
1. Introduction/1. Introduction.mp4 70.36 MB
1. Introduction/2. What is a Website.mp4 91.98 MB
10. DOM XSS Vulnerabilities/1. Introduction to DOM XSS Vulnerabilities.mp4 88.37 MB
10. DOM XSS Vulnerabilities/2. Discovering a Reflected DOM XSS in a Link.mp4 60.89 MB
10. DOM XSS Vulnerabilities/3. Discovering a Reflected XSS in an Image Tag!.mp4 66.89 MB
10. DOM XSS Vulnerabilities/4. Injecting Javascript Directly in a Page Script.mp4 71.21 MB
10. DOM XSS Vulnerabilities/5. Discovering XSS in a Drop-down Menu.mp4 62.16 MB
10. DOM XSS Vulnerabilities/6. Discovering XSS in AngularJS Application.mp4 46.56 MB
11. XSS - Bypassing Security/1. Bypassing Basic Filtering.mp4 73.08 MB
11. XSS - Bypassing Security/2. Bypassing Single-Quotes Filtering.mp4 96.84 MB
11. XSS - Bypassing Security/3. Bypassing Advanced Filtering.mp4 103.4 MB
11. XSS - Bypassing Security/4. Bypassing Server-Side Filtering.mp4 80.46 MB
11. XSS - Bypassing Security/5. Bypassing Extreme Filtering with Burp Intruder.mp4 105.95 MB
12. Bypassing Content Security Policy (CSP)/1. Analysing the Target Application.mp4 67.45 MB
12. Bypassing Content Security Policy (CSP)/2. Discovering an XSS in a CSP Enabled Application.mp4 96.66 MB
13. SQL Injection Vulnerabilities/1. Introduction to SQL Injection Vulnerabilities.mp4 128.86 MB
13. SQL Injection Vulnerabilities/2. Discovering SQL Injections.mp4 117.04 MB
13. SQL Injection Vulnerabilities/3. Bypassing Admin Login Using Logical Operators.mp4 68.94 MB
13. SQL Injection Vulnerabilities/4. Selecting Data From the Database.mp4 98.36 MB
13. SQL Injection Vulnerabilities/5. Accessing The Database Admin Records.mp4 80.26 MB
14. Blind SQL Injections/1. Discovering Blind SQL Injections.mp4 74.51 MB
14. Blind SQL Injections/2. Enumerating Table & Column Names.mp4 112.13 MB
14. Blind SQL Injections/3. Recovering Administrator Password With Burp Intruder.mp4 76.92 MB
14. Blind SQL Injections/4. Using the Cluster-Bomb Attack to Recover Passwords.mp4 82.6 MB
15. Time-Based Blind SQL Injection/1. Discovering Time-Based Blind SQLi.mp4 109.83 MB
15. Time-Based Blind SQL Injection/2. Extracting Data From the Database Using a Time-Based Blind SQLi.mp4 135.79 MB
15. Time-Based Blind SQL Injection/3. Getting The Admin Password Using a Time-Based Blind SQLi.mp4 105.26 MB
16. SSRF (Server-Side Request Forgery)/1. Introduction to SSRF Vulnerabilities.mp4 25.91 MB
16. SSRF (Server-Side Request Forgery)/2. Theory Behind SSRF Vulnerabilities & Their Impact.mp4 121.21 MB
16. SSRF (Server-Side Request Forgery)/3. Discovering a Basic SSRF Vulnerability.mp4 69.44 MB
16. SSRF (Server-Side Request Forgery)/4. Accessing Private (Admin) Resources Using an SSRF Vulnerability.mp4 92.9 MB
17. SSRF - Advanced Exploitation/1. Advanced SSRF Discovery.mp4 75.93 MB
17. SSRF - Advanced Exploitation/2. Scanning & Mapping Internal Network & Services.mp4 99.84 MB
18. SSRF - Bypassing Security/1. Bypassing Blacklists.mp4 123.5 MB
18. SSRF - Bypassing Security/2. Bypassing Whitelists.mp4 126.75 MB
18. SSRF - Bypassing Security/3. Chaining Open Redirection with SSRF to Bypass Restrictive Filters.mp4 75.21 MB
19. Blind SSRF Vulnerabilities/1. Introduction to Blind SSRF Vulnerabilities.mp4 74.46 MB
19. Blind SSRF Vulnerabilities/2. Discovering Blind SSRF Vulnerabilities.mp4 91.35 MB
19. Blind SSRF Vulnerabilities/3. Exploiting Blind SSRF Vulnerabilities.mp4 116.17 MB
19. Blind SSRF Vulnerabilities/4. Escalating Blind SSRF to a Remote Code Execution (RCE).mp4 105.68 MB
2. Information Disclosure vulnerabilities/1. Introduction to Information Disclosure Vulnerabilities.mp4 40.5 MB
2. Information Disclosure vulnerabilities/2. Discovering Database Login Credentials.mp4 84.37 MB
2. Information Disclosure vulnerabilities/3. Discovering Endpoints & Sensitive Data.mp4 74.05 MB
2. Information Disclosure vulnerabilities/4. Introduction to HTTP Status Codes.mp4 69.86 MB
2. Information Disclosure vulnerabilities/5. Employing the Hacker Bug Hunter Mentality to Discover Admin Login Information.mp4 82.4 MB
2. Information Disclosure vulnerabilities/6. Manipulating Application Behaviour Through the HTTP GET Method.mp4 83.69 MB
2. Information Disclosure vulnerabilities/7. Manipulating Application Behaviour Through the HTTP POST Method.mp4 81.41 MB
2. Information Disclosure vulnerabilities/8. Intercepting Requests With Brup Proxy.mp4 133.73 MB
20. XXE (XML External Entity) Injection/1. Introduction to XXE Injection Vulnerabilities.mp4 17.71 MB
20. XXE (XML External Entity) Injection/2. What is XML.mp4 57.39 MB
20. XXE (XML External Entity) Injection/3. Exploiting a Basic XXE Injection.mp4 103.46 MB
20. XXE (XML External Entity) Injection/4. Discovering an SSRF Through a Blind XXE.mp4 69.71 MB
21. 2 Hour Live Bug Hunting !/1. Introduction.mp4 37.64 MB
21. 2 Hour Live Bug Hunting !/10. Discovering an IDOR - Insecure Direct Object Reference.mp4 37.37 MB
21. 2 Hour Live Bug Hunting !/11. Discovering Hidden Endpoints Using Regex.mp4 123.08 MB
21. 2 Hour Live Bug Hunting !/12. Discovering a Complex Stored XSS.mp4 116.44 MB
21. 2 Hour Live Bug Hunting !/13. Discovering Bugs in Hidden Elements.mp4 116.59 MB
21. 2 Hour Live Bug Hunting !/14. Discovering Bugs in Hidden Parameters.mp4 78.77 MB
21. 2 Hour Live Bug Hunting !/2. Overview of the Target.mp4 128.13 MB
21. 2 Hour Live Bug Hunting !/3. Discovering an Open Redirect Vulnerability.mp4 67.63 MB
21. 2 Hour Live Bug Hunting !/4. Discovering a an XSS in the Response.mp4 95.2 MB
21. 2 Hour Live Bug Hunting !/5. Discovering an XSS in a HTML Comment.mp4 109.16 MB
21. 2 Hour Live Bug Hunting !/6. Discovering an XSS in a Date Picker.mp4 60.01 MB
21. 2 Hour Live Bug Hunting !/7. Broken Access Control in Booking Page.mp4 61.53 MB
21. 2 Hour Live Bug Hunting !/8. Analysing Application Files & Finding Sensitive Data.mp4 122.17 MB
21. 2 Hour Live Bug Hunting !/9. Discovering Endpoints Hidden In Code.mp4 43.2 MB
22. Participating in Bug Bounty Programs/1. Hacker1 Overview.mp4 100.77 MB
22. Participating in Bug Bounty Programs/2. Bug-Bounty Overview.mp4 70.72 MB
22. Participating in Bug Bounty Programs/3. Submitting a Bug Report.mp4 75.42 MB
3. Broken Access Control Vulnerabilities/1. Introduction to Broken Access Control Vulnerabilities.mp4 25.9 MB
3. Broken Access Control Vulnerabilities/2. Cookie Manipulation.mp4 81.12 MB
3. Broken Access Control Vulnerabilities/3. Accessing Private User Data.mp4 84.49 MB
3. Broken Access Control Vulnerabilities/4. Discovering IDOR Vulnerabilities (Insecure Direct Object Reference).mp4 109.83 MB
3. Broken Access Control Vulnerabilities/5. Privilege Escalation with Burp Repeater.mp4 96.61 MB
3. Broken Access Control Vulnerabilities/6. Debugging Flows with HTTP TRACE & Gaining Admin Access!.mp4 96.8 MB
4. Path Directory Traversal/1. Introduction to Path Traversal Vulnerabilities & Basic Discovery.mp4 133.76 MB
4. Path Directory Traversal/2. Bypassing Absolute Path Restriction.mp4 57.78 MB
4. Path Directory Traversal/3. Bypassing Hard-coded Extensions.mp4 52.74 MB
4. Path Directory Traversal/4. Bypassing Filtering.mp4 54.22 MB
4. Path Directory Traversal/5. Bypassing Hard-coded Paths.mp4 61.69 MB
4. Path Directory Traversal/6. Bypassing Advanced Filtering.mp4 65.01 MB
4. Path Directory Traversal/7. Bypassing Extreme Filtering.mp4 96.3 MB
5. CSRF - Client-Side Request Forgery/1. Discovering & Exploiting CSRF Vulnerabilities.mp4 87.93 MB
6. OAUTH 2.0 Vulnerabilities/1. Introduction to OAUTH 2.0.mp4 48.66 MB
6. OAUTH 2.0 Vulnerabilities/2. OAUTH 2.0 Basic Exploitation.mp4 116.54 MB
6. OAUTH 2.0 Vulnerabilities/3. Exploiting a Linking OAUTH 2.0 Flow Through CSRF.mp4 156.95 MB
6. OAUTH 2.0 Vulnerabilities/4. Exploiting a Login OAUTH 2.0 Flow Through CSRF.mp4 166.58 MB
7. Injection Vulnerabilities/1. Introduction to Injection Vulnerabilities.mp4 29.99 MB
8. OS Command Injection/1. Discovering a Basic Command Injection Vulnerability.mp4 85.1 MB
8. OS Command Injection/2. Discovering Blind Command Injection Vulnerabilities.mp4 97.6 MB
8. OS Command Injection/3. Discovering Asynchronous Blind Command Injection Vulnerabilities.mp4 108.27 MB
8. OS Command Injection/4. Using Burp Collaborator to Exploit Asynchronous Blind Command Injection.mp4 62.67 MB
9. XSS - Cross Site Scripting/1. Introduction to XSS Vulnerabilities & Its Types.mp4 56.09 MB
9. XSS - Cross Site Scripting/2. Discovering a HTML Injection Vulnerability.mp4 72.83 MB
9. XSS - Cross Site Scripting/3. Discovering Reflected & Stored XSS Vulnerabilities.mp4 59.59 MB
其他位置