|  

Ethical Hacking with JavaScript



Size :92.4 MB
Peers : Seeders : 0      Leechers : 0
Added : 1 year ago » by tutsnode » in Other
Language : English
Last Updated :6 months ago
Info_Hash :22B970E48C62BD47A80735F7892E0F1A35E306AB

Torrent File Contents

Ethical Hacking with JavaScript
  [TutsNode.net] - 03 - 2. Reconnaissance/03 - Introduction and setup for Retire.js.mp4
  -  10.8 MB

  TutsNode.net.txt
  -  63 Bytes

  [TutsNode.net] - 03 - 2. Reconnaissance/02 - Introduction and setup for Snyk.srt
  -  5.59 KB

  [TutsNode.net] - 03 - 2. Reconnaissance/03 - Introduction and setup for Retire.js.srt
  -  4.18 KB

  [TutsNode.net] - 01 - Welcome/01 - Ethical JavaScript hacking.srt
  -  2 KB

  [TutsNode.net] - 02 - 1. Introduction and Setup/02 - Overview of the cyber kill chain.srt
  -  4.06 KB

  [TutsNode.net] - 01 - Welcome/02 - What you should know.srt
  -  1.08 KB

  [TutsNode.net] - 03 - 2. Reconnaissance/04 - Introduction to AppSensor.srt
  -  3.98 KB

  [TutsNode.net] - 02 - 1. Introduction and Setup/01 - What is ethical hacking.srt
  -  2.51 KB

  [TutsNode.net] - 03 - 2. Reconnaissance/01 - Reconnaissance introduction.srt
  -  3.6 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/01 - Injection threat.srt
  -  3.58 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/02 - Broken authentication.srt
  -  3.4 KB

  [TutsNode.net] - 02 - 1. Introduction and Setup/03 - Plan an attack strategy.srt
  -  2.64 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/08 - Insufficient logging and monitoring.srt
  -  2.85 KB

  [TutsNode.net] - 02 - 1. Introduction and Setup/04 - Base project setup.srt
  -  2.29 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/05 - Security misconfiguration.srt
  -  2.39 KB

  [TutsNode.net] - 05 - Conclusion/01 - Next steps.srt
  -  2.34 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/07 - Components with known vulnerabilities.srt
  -  2.3 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/06 - Insecure deserialization.srt
  -  2.09 KB

  [TGx]Downloaded from torrentgalaxy.buzz .txt
  -  585 Bytes

  [TutsNode.net] - 04 - 3. Top Security Threats/04 - XML external entities.srt
  -  1.85 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/03 - Sensitive data.srt
  -  1.81 KB

  [TutsNode.net] - 03 - 2. Reconnaissance/05 - Review of the plan.srt
  -  1.48 KB

  .pad/0
  -  17.51 KB

  [TutsNode.net] - 03 - 2. Reconnaissance/02 - Introduction and setup for Snyk.mp4
  -  10.8 MB

  .pad/1
  -  77.5 KB

  [TutsNode.net] - 03 - 2. Reconnaissance/04 - Introduction to AppSensor.mp4
  -  8.67 MB

  .pad/2
  -  86.5 KB

  [TutsNode.net] - 01 - Welcome/01 - Ethical JavaScript hacking.mp4
  -  7.7 MB

  .pad/3
  -  50.5 KB

  [TutsNode.net] - 03 - 2. Reconnaissance/01 - Reconnaissance introduction.mp4
  -  5.88 MB

  .pad/4
  -  122 KB

  [TutsNode.net] - 05 - Conclusion/01 - Next steps.mp4
  -  4.73 MB

  .pad/5
  -  20.49 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/08 - Insufficient logging and monitoring.mp4
  -  4.54 MB

  .pad/6
  -  83.83 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/01 - Injection threat.mp4
  -  4.53 MB

  .pad/7
  -  95.83 KB

  [TutsNode.net] - 02 - 1. Introduction and Setup/02 - Overview of the cyber kill chain.mp4
  -  3.83 MB

  .pad/8
  -  41.37 KB

  [TutsNode.net] - 02 - 1. Introduction and Setup/01 - What is ethical hacking.mp4
  -  3.82 MB

  .pad/9
  -  59.5 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/02 - Broken authentication.mp4
  -  3.51 MB

  .pad/10
  -  119.5 KB

  [TutsNode.net] - 02 - 1. Introduction and Setup/03 - Plan an attack strategy.mp4
  -  3.39 MB

  .pad/11
  -  112.17 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/05 - Security misconfiguration.mp4
  -  2.81 MB

  .pad/12
  -  66.33 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/07 - Components with known vulnerabilities.mp4
  -  2.76 MB

  .pad/13
  -  113.33 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/04 - XML external entities.mp4
  -  2.49 MB

  .pad/14
  -  8.66 KB

  [TutsNode.net] - 02 - 1. Introduction and Setup/04 - Base project setup.mp4
  -  2.24 MB

  .pad/15
  -  7.45 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/06 - Insecure deserialization.mp4
  -  2.2 MB

  .pad/16
  -  51.33 KB

  [TutsNode.net] - 01 - Welcome/02 - What you should know.mp4
  -  2.14 MB

  .pad/17
  -  112 KB

  [TutsNode.net] - 04 - 3. Top Security Threats/03 - Sensitive data.mp4
  -  1.98 MB

  .pad/18
  -  23.5 KB

  [TutsNode.net] - 03 - 2. Reconnaissance/05 - Review of the plan.mp4
  -  1.7 MB

  .pad/19
  -  52.83 KB

  [TutsNode.net] - Ex_Files_Ethical_Hacking_JavaScript.zip
  -  494.63 KB



Torrent Description


Description

Web applications combine complexity and exposure to networks. JavaScript and the web offer great power, but also many opportunities to leave doors open to hackers. Ethical hacking lets you find those open doors before they can be exploited, and ensure that your sites and applications stay safe. This course was designed to equip JavaScript developers with ethical hacking techniques and tools that can help them boost the security of their JavaScript code. Instructor Emmanuel Henri shows how to put together an attack strategy and do some reconnaissance work using key tools, including Snyk, which automates finding and fixing vulnerabilities in projects. He also dives into some of the most common security threats out there, explaining what they are and how to spot them.