switch to basic browser
📂
📝
📟

🌲 / learning Testing - security Security Penetration Testing The Art of Hacking Series LiveLessons Lesson 7 Hacking Databases

c File Name Size files dur q vq aq Vc Ac Fmt Res fps T Date
-001. 7.0 Learning objectives en.srt640srtsrt2023-09-06 06:12:41
-001. 7.0 Learning objectives.mp4438573031.1470071126989128h264aacmov1280x72030mp42023-09-05 21:50:54
-002. 7.1 Reviewing Database Fundamentals en.srt9113srtsrt2023-09-06 06:12:42
-002. 7.1 Reviewing Database Fundamentals.mp439386355462.805011680544128h264aacmov1280x72030mp42023-09-05 21:50:59
-003. 7.2 Attacking a Database Discovery, Validation, and Exploitation en.srt17992srtsrt2023-09-06 06:12:42
-003. 7.2 Attacking a Database Discovery, Validation, and Exploitation.mp495395556882.837007864727128h264aacmov1280x72030mp42023-09-05 21:51:08
-004. 7.3 Attacking a Database Automated Scanners en.srt4293srtsrt2023-09-06 06:12:43
-004. 7.3 Attacking a Database Automated Scanners.mp410810793208.277007415279128h264aacmov1280x72030mp42023-09-05 21:51:10
-005. 7.4 Surveying Defenses to Mitigate Database Hacking en.srt9009srtsrt2023-09-06 06:12:44
-005. 7.4 Surveying Defenses to Mitigate Database Hacking.mp438889919396.351995784648128h264aacmov1280x72030mp42023-09-05 21:51:15

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB