switch to basic browser
📂
📝
📟

🌲 / learning Testing - security CompTIA PenTest+ (PT1-001) Lesson 6 Exploiting Application-based Vulnerabilities

c File Name Size files dur q vq aq Vc Ac Fmt Res fps T Date
-001. Learning objectives en.srt1188srtsrt2023-09-05 21:07:22
-001. Learning objectives.mp4673921952.1390021034898128h264aacmov1280x72030mp42023-09-05 21:01:27
-002. 6.1 Overview of Web Applications for Security Professionals en.srt26666srtsrt2023-09-05 21:07:23
-002. 6.1 Overview of Web Applications for Security Professionals.mp4558203001136.941859392259125h264aacmov1280x72030mp42023-09-05 21:01:33
-003. 6.1 Overview of Web Applications for Security Professionals en.srt26666srtsrt2023-09-05 21:07:24
-003. 6.2 How to Build Your Own Web Application Lab.mp420113725288.275737558424125h264aacmov1280x72030mp42023-09-05 21:01:36
-004. 6.2 How to Build Your Own Web Application Lab en.srt7302srtsrt2023-09-05 21:07:26
-004. 6.3 Understanding SQL Injection.mp450749388894.316553453320125h264aacmov1280x72030mp42023-09-05 21:01:41
-005. 6.3 Understanding SQL Injection en.srt22602srtsrt2023-09-05 21:07:27
-005. 6.4 Understanding Injection Vulnerabilities.mp4939845190.133333834699128h264aacmov1280x72030mp42023-09-05 21:01:43
-006. 6.5 Exploiting Command Injection Vulnerabilities.mp49314812155.643356478345125h264aacmov1280x72030mp42023-09-05 21:01:44
-007. 6.4 Understanding Injection Vulnerabilities en.srt2273srtsrt2023-09-05 21:07:29
-007. 6.6 Understanding Authentication-based Vulnerabilities.mp4612440571040.137868471337125h264aacmov1280x72030mp42023-09-05 21:01:50
-008. 6.5 Exploiting Command Injection Vulnerabilities en.srt4280srtsrt2023-09-05 21:07:30
-008. 6.7 Exploiting Authorization-based Vulnerabilities.mp46055513146.819773329196125h264aacmov1280x72030mp42023-09-05 21:01:52
-009. 6.6 Understanding Authentication-based Vulnerabilities en.srt28805srtsrt2023-09-05 21:07:31
-009. 6.8 Understanding Cross-site Scripting (XSS) Vulnerabilities.mp421101828333.299252506373125h264aacmov1280x72030mp42023-09-05 21:01:55
-010. 6.7 Exploiting Authorization-based Vulnerabilities en.srt3314srtsrt2023-09-05 21:07:32
-010. 6.9 Understanding Cross-site Request Forgery (CSRFXSRF).mp47242946147.771791392258125h264aacmov1280x72030mp42023-09-05 21:01:57
-011. 6.10 Understanding Clickjacking.mp4351176275.2373238128h264aacmov1280x72030mp42023-09-05 21:01:58
-011. 6.7 Exploiting Authorization-based Vulnerabilities en.srt3314srtsrt2023-09-05 21:07:33
-012. 6.11 Exploiting Insecure Direct Object References and Path Traversal.mp430646731418.052086586453125h264aacmov1280x72030mp42023-09-05 21:02:09
-012. 6.8 Understanding Cross-site Scripting (XSS) Vulnerabilities en.srt8536srtsrt2023-09-05 21:07:34
-013. 6.12 Assessing Unsecure Code Practices and APIs.mp417814886319.436916446312125h264aacmov1280x72030mp42023-09-05 21:02:14
-013. 6.9 Understanding Cross-site Request Forgery (CSRFXSRF) en.srt3613srtsrt2023-09-05 21:07:36
-014. 6.10 Understanding Clickjacking en.srt1469srtsrt2023-09-05 21:07:37
-015. 6.11 Exploiting Insecure Direct Object References and Path Traversal en.srt10253srtsrt2023-09-05 21:07:38
-016. 6.12 Assessing Unsecure Code Practices and APIs en.srt7635srtsrt2023-09-05 21:07:39
-017. 6.12 Assessing Unsecure Code Practices and APIs en.srt7635srtsrt2023-09-05 21:07:41

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB