| - | 001. Learning objectives.mp4 | 454296 | | 64.234671 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:02 |
| - | 002. 19.1 Introducing Web Application Concepts.mp4 | 3457361 | | 490.41068 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:03 |
| - | 003. 19.2 Understanding Web App Threats and Hacking Methodologies.mp4 | 3256893 | | 461.972993 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:04 |
| - | 004. 19.3 Footprinting Web Infrastructures.mp4 | 5175871 | | 734.271995 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:05 |
| - | 005. 19.4 Analyzing Web Applications.mp4 | 2996706 | | 425.045011 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:07 |
| - | 006. 19.5 Introducing the OWASP Top 10.mp4 | 1646192 | | 233.408005 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:08 |
| - | 007. 19.6 Attacking Authentication, Authorization, and Access Controls - Part 1.mp4 | 2688086 | | 381.269002 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:09 |
| - | 008. 19.7 Attacking Authentication, Authorization, and Access Controls - Part 2.mp4 | 6470448 | | 917.972993 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:10 |
| - | 009. 19.8 Performing Command Injection Attacks.mp4 | 1678756 | | 238.037007 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:11 |
| - | 010. 19.9 Exploiting DirectoryPath Traversal Vulnerabilities.mp4 | 1598901 | | 226.709002 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:13 |
| - | 011. 19.1 Input Validation and Sanitation.mp4 | 1913903 | | 271.402653 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:14 |
| - | 012. 19.11 Exploiting Cross-site Scripting (XSS) Vulnerabilities.mp4 | 5174083 | | 734.015986 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:15 |
| - | 013. 19.12 Exploiting XML External Entities.mp4 | 2555213 | | 362.41068 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:16 |
| - | 014. 19.13 Attacking Web Services, APIs, and Understanding Webhooks.mp4 | 4659619 | | 661.012993 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:18 |