zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Advanced Web Application Penetration Testing with Burp Suite
magnet:?xt=urn:btih:3fb98710ed3c863865c7f8ea0468b46abc61c0ed&dn=Advanced Web Application Penetration Testing with Burp Suite
磁力链接详情
文件列表详情
3fb98710ed3c863865c7f8ea0468b46abc61c0ed
infohash:
25
文件数量
231.28 MB
文件大小
2018-7-8 19:42
创建日期
2024-11-11 05:36
最后访问
相关分词
Advanced
Web
Application
Penetration
Testing
with
Burp
Suite
1. Course Overview/01. Course Overview.mp4 6.75 MB
2. Setting up Your Burp Suite Environment for This Course/02. Audience and Purpose.mp4 1.43 MB
2. Setting up Your Burp Suite Environment for This Course/03. Rules of Engagement.mp4 13.98 MB
2. Setting up Your Burp Suite Environment for This Course/04. Free vs. Professional Editions.mp4 2.5 MB
2. Setting up Your Burp Suite Environment for This Course/05. Setting up Your Project File.mp4 4.76 MB
2. Setting up Your Burp Suite Environment for This Course/06. Setting up Your Options Configurations.mp4 7.24 MB
3. Hybrid Spidering Your Web Application/07. Gray Box Testing.mp4 8.3 MB
3. Hybrid Spidering Your Web Application/08. Scoping Your Target.mp4 3.89 MB
3. Hybrid Spidering Your Web Application/09. Spidering Your Scoped Target.mp4 13.74 MB
3. Hybrid Spidering Your Web Application/10. Privilege Escalation Discovery.mp4 10.2 MB
3. Hybrid Spidering Your Web Application/11. Directory Brute-forcing.mp4 6.42 MB
3. Hybrid Spidering Your Web Application/12. Scanning Your Target.mp4 7.63 MB
4. Exploiting Vulnerabilities in Your Web Application/13. Using Burp to Find Common Vulnerabilities.mp4 6.73 MB
4. Exploiting Vulnerabilities in Your Web Application/14. Using Burp to Perform SQL Injection (SQLi) Attacks.mp4 16.42 MB
4. Exploiting Vulnerabilities in Your Web Application/15. Using Burp to Perform XSS Injection Attacks.mp4 9.44 MB
4. Exploiting Vulnerabilities in Your Web Application/16. Using Burp to Uncover Cookie_Session Management Issues.mp4 9.53 MB
4. Exploiting Vulnerabilities in Your Web Application/17. Using Burp to Perform Parameter Tampering.mp4 15.73 MB
4. Exploiting Vulnerabilities in Your Web Application/18. Using Burp to Perform Cross-site Request Forgery (CSRF) Attacks.mp4 11.72 MB
4. Exploiting Vulnerabilities in Your Web Application/19. Using Burp to Determine Clickjacking Vulnerabilities.mp4 7.07 MB
5. Integrating Burp and File Attacks/20. Burp Extenders Explained.mp4 8.06 MB
5. Integrating Burp and File Attacks/21. Burp Extenders Sampling.mp4 12.81 MB
5. Integrating Burp and File Attacks/22. Burp and File Uploads.mp4 4.47 MB
5. Integrating Burp and File Attacks/23. Burp and File Downloads.mp4 5.77 MB
6. Writing Your Own Burp Extension and Exercising Automation/24. Custom Burp Plugins.mp4 30.12 MB
6. Writing Your Own Burp Extension and Exercising Automation/25. Automating Burp.mp4 6.58 MB
其他位置