f69dc311a936 // 3.77 TiB free of 3.98 TiB

c File Name Size Date
parent folder--
-001. Learning objectives en.srt11882023-09-05 21:07:22
-001. Learning objectives.mp467392192023-09-05 21:01:27
-002. 6.1 Overview of Web Applications for Security Professionals en.srt266662023-09-05 21:07:23
-002. 6.1 Overview of Web Applications for Security Professionals.mp4558203002023-09-05 21:01:33
-003. 6.1 Overview of Web Applications for Security Professionals en.srt266662023-09-05 21:07:24
-003. 6.2 How to Build Your Own Web Application Lab.mp4201137252023-09-05 21:01:36
-004. 6.2 How to Build Your Own Web Application Lab en.srt73022023-09-05 21:07:26
-004. 6.3 Understanding SQL Injection.mp4507493882023-09-05 21:01:41
-005. 6.3 Understanding SQL Injection en.srt226022023-09-05 21:07:27
-005. 6.4 Understanding Injection Vulnerabilities.mp493984512023-09-05 21:01:43
-006. 6.5 Exploiting Command Injection Vulnerabilities.mp493148122023-09-05 21:01:44
-007. 6.4 Understanding Injection Vulnerabilities en.srt22732023-09-05 21:07:29
-007. 6.6 Understanding Authentication-based Vulnerabilities.mp4612440572023-09-05 21:01:50
-008. 6.5 Exploiting Command Injection Vulnerabilities en.srt42802023-09-05 21:07:30
-008. 6.7 Exploiting Authorization-based Vulnerabilities.mp460555132023-09-05 21:01:52
-009. 6.6 Understanding Authentication-based Vulnerabilities en.srt288052023-09-05 21:07:31
-009. 6.8 Understanding Cross-site Scripting (XSS) Vulnerabilities.mp4211018282023-09-05 21:01:55
-010. 6.7 Exploiting Authorization-based Vulnerabilities en.srt33142023-09-05 21:07:32
-010. 6.9 Understanding Cross-site Request Forgery (CSRFXSRF).mp472429462023-09-05 21:01:57
-011. 6.10 Understanding Clickjacking.mp435117622023-09-05 21:01:58
-011. 6.7 Exploiting Authorization-based Vulnerabilities en.srt33142023-09-05 21:07:33
-012. 6.11 Exploiting Insecure Direct Object References and Path Traversal.mp4306467312023-09-05 21:02:09
-012. 6.8 Understanding Cross-site Scripting (XSS) Vulnerabilities en.srt85362023-09-05 21:07:34
-013. 6.12 Assessing Unsecure Code Practices and APIs.mp4178148862023-09-05 21:02:14
-013. 6.9 Understanding Cross-site Request Forgery (CSRFXSRF) en.srt36132023-09-05 21:07:36
-014. 6.10 Understanding Clickjacking en.srt14692023-09-05 21:07:37
-015. 6.11 Exploiting Insecure Direct Object References and Path Traversal en.srt102532023-09-05 21:07:38
-016. 6.12 Assessing Unsecure Code Practices and APIs en.srt76352023-09-05 21:07:39
-017. 6.12 Assessing Unsecure Code Practices and APIs en.srt76352023-09-05 21:07:41

control-panel