|  

Udemy | How to Hack a Web Application- Security Practices [FTU] GloDLS



Size :1.53 GB
Peers : Seeders : 0      Leechers : 0
Added : 5 years ago » by SaM » in Tutorials
Language : English
Last Updated :7 months ago
Info_Hash :48CCBDD88806B4BCEC78F92B227B2DE1A275C55C

Torrent File Contents

Udemy | How to Hack a Web Application- Security Practices [FTU] GloDLS
  10. 9- XSS Attack/1. XSS Attack.mp4
  -  123.18 MB

  10. 9- XSS Attack/1. XSS Attack.vtt
  -  15.15 KB

  10. 9- XSS Attack/2. Black-list vs While-list.mp4
  -  14.54 MB

  10. 9- XSS Attack/2. Black-list vs While-list.vtt
  -  2.56 KB

  10. 9- XSS Attack/3. XSS Attack Solution.mp4
  -  42 MB

  10. 9- XSS Attack/3. XSS Attack Solution.vtt
  -  5.29 KB

  11. 10- SQL Injection/1. SQL Injection.mp4
  -  18.34 MB

  11. 10- SQL Injection/1. SQL Injection.vtt
  -  5.29 KB

  11. 10- SQL Injection/2. SQL Injection Solution.mp4
  -  15.36 MB

  11. 10- SQL Injection/2. SQL Injection Solution.vtt
  -  2.3 KB

  12. 11- Directory Traversal/1. Directory Traversal.mp4
  -  17.31 MB

  12. 11- Directory Traversal/1. Directory Traversal.vtt
  -  3.23 KB

  12. 11- Directory Traversal/2. Directory Traversal Solution.mp4
  -  21.28 MB

  12. 11- Directory Traversal/2. Directory Traversal Solution.vtt
  -  3.09 KB

  13. 12- Denial Of service/1. Denial Of service.mp4
  -  8.23 MB

  13. 12- Denial Of service/1. Denial Of service.vtt
  -  2.35 KB

  14. 13- FingerPrinting Of the server/1. FingerPrinting Of the server.mp4
  -  9.89 MB

  14. 13- FingerPrinting Of the server/1. FingerPrinting Of the server.vtt
  -  2.45 KB

  1. Introduction/1. Introduction.mp4
  -  20.42 MB

  1. Introduction/1. Introduction.vtt
  -  3.85 KB

  1. Introduction/2. What you need to know.mp4
  -  6.48 MB

  1. Introduction/2. What you need to know.vtt
  -  1.58 KB

  1. Introduction/3. Client-server communication concept.mp4
  -  19.21 MB

  1. Introduction/3. Client-server communication concept.vtt
  -  6.25 KB

  1. Introduction/4. Opposing Goals.mp4
  -  34.78 MB

  1. Introduction/4. Opposing Goals.vtt
  -  4.79 KB

  1. Introduction/5. Get vs POST request.mp4
  -  122.53 MB

  1. Introduction/5. Get vs POST request.vtt
  -  13 KB

  1. Introduction/6. Cookie vs Session.mp4
  -  67.14 MB

  1. Introduction/6. Cookie vs Session.vtt
  -  9.43 KB

  1. Introduction/7. Dummy Website to apply Attack.html
  -  163 Bytes

  1. Introduction/8.1 swa.zip.zip
  -  112.19 KB

  1. Introduction/8. Course material.html
  -  38 Bytes

  2. 1- Gathering Information on the Target/1. HTML Attack.mp4
  -  54.18 MB

  2. 1- Gathering Information on the Target/1. HTML Attack.vtt
  -  6.92 KB

  2. 1- Gathering Information on the Target/2. HTML Attack solution.mp4
  -  27.4 MB

  2. 1- Gathering Information on the Target/2. HTML Attack solution.vtt
  -  3.74 KB

  3. 2- Bypass Restriction and validation of input/1. ByPass Restriction of input.mp4
  -  31.91 MB

  3. 2- Bypass Restriction and validation of input/1. ByPass Restriction of input.vtt
  -  5.12 KB

  3. 2- Bypass Restriction and validation of input/2. ByPass Restriction of input solution.mp4
  -  70.77 MB

  3. 2- Bypass Restriction and validation of input/2. ByPass Restriction of input solution.vtt
  -  7.18 KB

  4. 3- Query String Attack/1. Query String Attack.mp4
  -  13.9 MB

  4. 3- Query String Attack/1. Query String Attack.vtt
  -  3.36 KB

  4. 3- Query String Attack/2. Query String Solution.mp4
  -  109.01 MB

  4. 3- Query String Attack/2. Query String Solution.vtt
  -  11.08 KB

  5. 4- Cookies Attack/1. Cookies Attack.mp4
  -  46.31 MB

  5. 4- Cookies Attack/1. Cookies Attack.vtt
  -  9.24 KB

  5. 4- Cookies Attack/2. Cookies Attack Solution.mp4
  -  9.62 MB

  5. 4- Cookies Attack/2. Cookies Attack Solution.vtt
  -  1.67 KB

  6. 5- Hidden Field Attack/1. Hidden Field.mp4
  -  6.98 MB

  6. 5- Hidden Field Attack/1. Hidden Field.vtt
  -  1.16 KB

  6. 5- Hidden Field Attack/2. Hidden Field Solution.mp4
  -  15.49 MB

  6. 5- Hidden Field Attack/2. Hidden Field Solution.vtt
  -  1.82 KB

  7. 6- URL Jumping Attack/1. URL Jumping Attack and Soltuion.mp4
  -  2.7 MB

  7. 6- URL Jumping Attack/1. URL Jumping Attack and Soltuion.vtt
  -  863 Bytes

  7. 6- URL Jumping Attack/2. URL Jumping Solution.mp4
  -  95.87 MB

  7. 6- URL Jumping Attack/2. URL Jumping Solution.vtt
  -  9 KB

  8. 7- Session Hijacking/1. Session Hijacking.mp4
  -  28.05 MB

  8. 7- Session Hijacking/1. Session Hijacking.vtt
  -  3.7 KB

  8. 7- Session Hijacking/2. Session Hijacking Solution.mp4
  -  160.09 MB

  8. 7- Session Hijacking/2. Session Hijacking Solution.vtt
  -  15.71 KB

  9. 8- CSRF attack/1. CSRF attack.mp4
  -  46.12 MB

  9. 8- CSRF attack/1. CSRF attack.vtt
  -  6.26 KB

  9. 8- CSRF attack/2. CSRF attack fixing.mp4
  -  120.49 MB

  9. 8- CSRF attack/2. CSRF attack fixing.vtt
  -  12.18 KB

  9. 8- CSRF attack/3. Avoid CSRF attack in Ajax Request.mp4
  -  189.84 MB

  9. 8- CSRF attack/3. Avoid CSRF attack in Ajax Request.vtt
  -  16.2 KB

  Discuss.FTUForum.com.html
  -  31.89 KB

  FreeCoursesOnline.Me.html
  -  108.3 KB

  FTUForum.com.html
  -  100.44 KB

  How you can help Team-FTU.txt
  -  235 Bytes

  NulledPremium.com.url
  -  163 Bytes

  Torrent Downloaded From GloDls.buzz.txt
  -  84 Bytes

  Torrent Downloaded From ProstyleX.com.txt
  -  38 Bytes



Torrent Description

Description:


Learn how to hack website or Web application and how to write secure Web application.

Created by:  Hussein Al Rubaye
Last updated: 4/2019
Language: English
Caption (CC): Included
Torrent Contains: 74 Files, 14 Folders
Course Source: https://www.udemy.com/how-to-hack-a-web-application/

What you'll learn

• How to hack web Application
• How to build secure Application
• Be good hacker, good tester, or good developer

Requirements

• If you are hacker or tester you donot need to have any background, i will teach you everything
• If you are developer you need to know how to write Web App
• You will need a computer running Microsoft Windows, or Linux, or a Mac running OS X.

Description

This course for anyone who wants to hack web Apps or secure web Apps or test web apps from scratch, We will start by discus fundamentals of web development. Then we will start talking about how to gathering Information on the Target to attack. Then we will learn how to Bypass Restriction and validation of input then how to secure our web Apps from the bypassing process. Then we will talk about a number of attacks such as Query String Attack, Cookies Attack, Hidden Field attack, URL Jumping Attack,csrf attack and how to use Session Hijacking to stole user identity. Then we will talk about XSS Attack and how could be used to stole cookies and show ADS or apply pishing, and SQL Injection that could be used to break the Web App database. Then we will talk about Directory Traversal and Denial Of Service. All the practises has real-world exercises.

Who this course is for:

• Developer who wants to build secure Web App
• Tester who wants to find holes in Web App
• Hacker who wants to find holes to break web App.