Download link
File List
-
01.Introduction/01.About the course.srt 2.73 KB
01.Introduction/01.About the course.wmv 3.25 MB
01.Introduction/02.Why hack yourself first.srt 5.74 KB
01.Introduction/02.Why hack yourself first.wmv 7.17 MB
01.Introduction/03.Introducing a vulnerable website – Supercar Showdown.srt 6.81 KB
01.Introduction/03.Introducing a vulnerable website – Supercar Showdown.wmv 13.94 MB
01.Introduction/04.Using Chrome's developer tools.srt 7.32 KB
01.Introduction/04.Using Chrome's developer tools.wmv 12.69 MB
01.Introduction/05.Monitoring and composing requests with Fiddler.srt 6.33 KB
01.Introduction/05.Monitoring and composing requests with Fiddler.wmv 8.36 MB
01.Introduction/06.Modifying requests and responses in Fiddler.srt 4.41 KB
01.Introduction/06.Modifying requests and responses in Fiddler.wmv 8.75 MB
02.Transport Layer Protection/01.Introduction.srt 1.77 KB
02.Transport Layer Protection/01.Introduction.wmv 2.27 MB
02.Transport Layer Protection/02.The three objectives of transport layer protection.srt 3.86 KB
02.Transport Layer Protection/02.The three objectives of transport layer protection.wmv 4.18 MB
02.Transport Layer Protection/03.Understanding a man in the middle attack.srt 4.97 KB
02.Transport Layer Protection/03.Understanding a man in the middle attack.wmv 6.29 MB
02.Transport Layer Protection/04.Protecting sensitive data in transit.srt 7.68 KB
02.Transport Layer Protection/04.Protecting sensitive data in transit.wmv 11.88 MB
02.Transport Layer Protection/05.The risk of sending cookies over insecure connections.srt 16.42 KB
02.Transport Layer Protection/05.The risk of sending cookies over insecure connections.wmv 26.91 MB
02.Transport Layer Protection/06.How loading login forms over HTTP is risky.srt 24.45 KB
02.Transport Layer Protection/06.How loading login forms over HTTP is risky.wmv 43.06 MB
02.Transport Layer Protection/07.Exploiting mixed-mode content.srt 13.32 KB
02.Transport Layer Protection/07.Exploiting mixed-mode content.wmv 20.54 MB
02.Transport Layer Protection/08.The HSTS header.srt 8.93 KB
02.Transport Layer Protection/08.The HSTS header.wmv 15.21 MB
02.Transport Layer Protection/09.Summary.srt 3.95 KB
02.Transport Layer Protection/09.Summary.wmv 4.56 MB
03.Cross Site Scripting (XSS)/01.Introduction.srt 2.19 KB
03.Cross Site Scripting (XSS)/01.Introduction.wmv 2.57 MB
03.Cross Site Scripting (XSS)/02.Understanding untrusted data and sanitisation.srt 9.62 KB
03.Cross Site Scripting (XSS)/02.Understanding untrusted data and sanitisation.wmv 9.79 MB
03.Cross Site Scripting (XSS)/03.Establishing input sanitisation practices.srt 6.27 KB
03.Cross Site Scripting (XSS)/03.Establishing input sanitisation practices.wmv 7.85 MB
03.Cross Site Scripting (XSS)/04.Understanding XSS and output encoding.srt 13.54 KB
03.Cross Site Scripting (XSS)/04.Understanding XSS and output encoding.wmv 15.08 MB
03.Cross Site Scripting (XSS)/05.Identifying the use of output encoding.srt 7.14 KB
03.Cross Site Scripting (XSS)/05.Identifying the use of output encoding.wmv 9.27 MB
03.Cross Site Scripting (XSS)/06.Delivering a payload via reflected XSS.srt 13.13 KB
03.Cross Site Scripting (XSS)/06.Delivering a payload via reflected XSS.wmv 14.78 MB
03.Cross Site Scripting (XSS)/07.Testing for the risk of persistent XSS.srt 10.38 KB
03.Cross Site Scripting (XSS)/07.Testing for the risk of persistent XSS.wmv 22.85 MB
03.Cross Site Scripting (XSS)/08.The X-XSS-Protection header.srt 8.72 KB
03.Cross Site Scripting (XSS)/08.The X-XSS-Protection header.wmv 16.54 MB
03.Cross Site Scripting (XSS)/09.Summary.srt 4.04 KB
03.Cross Site Scripting (XSS)/09.Summary.wmv 4.91 MB
04.Cookies/01.Introduction.srt 1.65 KB
04.Cookies/01.Introduction.wmv 1.75 MB
04.Cookies/02.Cookies 101.srt 9.47 KB
04.Cookies/02.Cookies 101.wmv 10.21 MB
04.Cookies/03.Understanding HttpOnly cookies.srt 6.88 KB
04.Cookies/03.Understanding HttpOnly cookies.wmv 19.31 MB
04.Cookies/04.Understanding secure cookies.srt 8.61 KB
04.Cookies/04.Understanding secure cookies.wmv 16.83 MB
04.Cookies/05.Restricting cookie access by path.srt 13.19 KB
04.Cookies/05.Restricting cookie access by path.wmv 23.11 MB
04.Cookies/06.Reducing risk with cookie expiration.srt 8.63 KB
04.Cookies/06.Reducing risk with cookie expiration.wmv 12.35 MB
04.Cookies/07.Using session cookies to further reduce risk.srt 5.69 KB
04.Cookies/07.Using session cookies to further reduce risk.wmv 8.86 MB
04.Cookies/08.Summary.srt 3.23 KB
04.Cookies/08.Summary.wmv 4.1 MB
05.Internal Implementation Disclosure/01.Introduction.srt 2.62 KB
05.Internal Implementation Disclosure/01.Introduction.wmv 2.98 MB
05.Internal Implementation Disclosure/02.How an attacker builds a website risk profile.srt 9.76 KB
05.Internal Implementation Disclosure/02.How an attacker builds a website risk profile.wmv 15.67 MB
05.Internal Implementation Disclosure/03.Server response header disclosure.srt 8.96 KB
05.Internal Implementation Disclosure/03.Server response header disclosure.wmv 11.68 MB
05.Internal Implementation Disclosure/04.Locating at-risk websites.srt 8.94 KB
05.Internal Implementation Disclosure/04.Locating at-risk websites.wmv 19.84 MB
05.Internal Implementation Disclosure/05.HTTP fingerprinting of servers.srt 11.87 KB
05.Internal Implementation Disclosure/05.HTTP fingerprinting of servers.wmv 14.07 MB
05.Internal Implementation Disclosure/06.Disclosure via robots.txt.srt 6.83 KB
05.Internal Implementation Disclosure/06.Disclosure via robots.txt.wmv 7.43 MB
05.Internal Implementation Disclosure/07.The risks in HTML source.srt 5.95 KB
05.Internal Implementation Disclosure/07.The risks in HTML source.wmv 7.54 MB
05.Internal Implementation Disclosure/08.Internal error message leakage.srt 14.07 KB
05.Internal Implementation Disclosure/08.Internal error message leakage.wmv 17.98 MB
05.Internal Implementation Disclosure/09.Lack of access controls on diagnostic data.srt 14.14 KB
05.Internal Implementation Disclosure/09.Lack of access controls on diagnostic data.wmv 19.92 MB
05.Internal Implementation Disclosure/10.Summary.srt 5.08 KB
05.Internal Implementation Disclosure/10.Summary.wmv 6.21 MB
06.Parameter Tampering/01.Introduction.srt 2.83 KB
06.Parameter Tampering/01.Introduction.wmv 3.21 MB
06.Parameter Tampering/02.Identifying untrusted data in HTTP request parameters.srt 14.36 KB
06.Parameter Tampering/02.Identifying untrusted data in HTTP request parameters.wmv 17.95 MB
06.Parameter Tampering/03.Capturing requests and manipulating parameters.srt 12.52 KB
06.Parameter Tampering/03.Capturing requests and manipulating parameters.wmv 19.94 MB
06.Parameter Tampering/04.Manipulating application logic via parameters.srt 9.42 KB
06.Parameter Tampering/04.Manipulating application logic via parameters.wmv 14.69 MB
06.Parameter Tampering/05.Testing for missing server side validation.srt 20.62 KB
06.Parameter Tampering/05.Testing for missing server side validation.wmv 31.58 MB
06.Parameter Tampering/06.Understanding model binding.srt 4.86 KB
06.Parameter Tampering/06.Understanding model binding.wmv 5.03 MB
06.Parameter Tampering/07.Executing a mass assignment attack.srt 11.72 KB
06.Parameter Tampering/07.Executing a mass assignment attack.wmv 16.3 MB
06.Parameter Tampering/08.HTTP verb tampering.srt 13.97 KB
06.Parameter Tampering/08.HTTP verb tampering.wmv 20.47 MB
06.Parameter Tampering/09.Fuzz testing.srt 19.72 KB
06.Parameter Tampering/09.Fuzz testing.wmv 28.12 MB
06.Parameter Tampering/10.Summary.srt 6.89 KB
06.Parameter Tampering/10.Summary.wmv 8.15 MB
07.SQL Injection/01.Outline.srt 2.71 KB
07.SQL Injection/01.Outline.wmv 2.91 MB
07.SQL Injection/02.Understanding SQL injection.srt 13.06 KB
07.SQL Injection/02.Understanding SQL injection.wmv 14.2 MB
07.SQL Injection/03.Testing for injection risks.srt 10.69 KB
07.SQL Injection/03.Testing for injection risks.wmv 13.95 MB
07.SQL Injection/04.Discovering database structure via injection.srt 17.58 KB
07.SQL Injection/04.Discovering database structure via injection.wmv 22.83 MB
07.SQL Injection/05.Harvesting data via injection.srt 5.8 KB
07.SQL Injection/05.Harvesting data via injection.wmv 8.25 MB
07.SQL Injection/06.Automating attacks with Havij.srt 9.62 KB
07.SQL Injection/06.Automating attacks with Havij.wmv 12.97 MB
07.SQL Injection/07.Blind SQL injection.srt 21.48 KB
07.SQL Injection/07.Blind SQL injection.wmv 26.47 MB
07.SQL Injection/08.Secure app patterns.srt 11.33 KB
07.SQL Injection/08.Secure app patterns.wmv 13.15 MB
07.SQL Injection/09.Summary.srt 7.52 KB
07.SQL Injection/09.Summary.wmv 8.62 MB
08.Cross Site Attacks/01.Introduction.srt 1.92 KB
08.Cross Site Attacks/01.Introduction.wmv 2.24 MB
08.Cross Site Attacks/02.Understanding cross site attacks.srt 6.29 KB
08.Cross Site Attacks/02.Understanding cross site attacks.wmv 7.73 MB
08.Cross Site Attacks/03.Testing for a cross site request forgery risk.srt 10.58 KB
08.Cross Site Attacks/03.Testing for a cross site request forgery risk.wmv 14.22 MB
08.Cross Site Attacks/04.The role of anti-forgery tokens.srt 16.16 KB
08.Cross Site Attacks/04.The role of anti-forgery tokens.wmv 21.68 MB
08.Cross Site Attacks/05.Testing cross site request forgery against APIs.srt 15.18 KB
08.Cross Site Attacks/05.Testing cross site request forgery against APIs.wmv 26.01 MB
08.Cross Site Attacks/06.Mounting a clickjacking attack.srt 20.03 KB
08.Cross Site Attacks/06.Mounting a clickjacking attack.wmv 29.53 MB
08.Cross Site Attacks/07.Summary.srt 4.87 KB
08.Cross Site Attacks/07.Summary.wmv 5.67 MB
09.Account Management/01.Introduction.srt 3.24 KB
09.Account Management/01.Introduction.wmv 3.6 MB
09.Account Management/02.Understanding password strength and attack vectors.srt 15.56 KB
09.Account Management/02.Understanding password strength and attack vectors.wmv 21.5 MB
09.Account Management/03.Limiting characters in passwords.srt 7.98 KB
09.Account Management/03.Limiting characters in passwords.wmv 9.13 MB
09.Account Management/04.Emailing credentials on account creation.srt 2.89 KB
09.Account Management/04.Emailing credentials on account creation.wmv 3.76 MB
09.Account Management/05.Account enumeration.srt 10.74 KB
09.Account Management/05.Account enumeration.wmv 12.19 MB
09.Account Management/06.Denial of service via password reset.srt 3.38 KB
09.Account Management/06.Denial of service via password reset.wmv 3.52 MB
09.Account Management/07.Correctly securing the reset processes.srt 4.58 KB
09.Account Management/07.Correctly securing the reset processes.wmv 5.19 MB
09.Account Management/08.Establishing insecure password storage.srt 11.26 KB
09.Account Management/08.Establishing insecure password storage.wmv 16.65 MB
09.Account Management/09.Testing for risks in the 'remember me' feature.srt 7.44 KB
09.Account Management/09.Testing for risks in the 'remember me' feature.wmv 13.36 MB
09.Account Management/10.Re-authenticating before key actions.srt 5.73 KB
09.Account Management/10.Re-authenticating before key actions.wmv 6.17 MB
09.Account Management/11.Testing for authentication brute force.srt 10.91 KB
09.Account Management/11.Testing for authentication brute force.wmv 13.01 MB
09.Account Management/12.Summary.srt 6.58 KB
09.Account Management/12.Summary.wmv 7.91 MB
hack-yourself-first.zip 33.96 MB
Download Info
-
Tips
“Hack Yourself First - How to go on the Cyber-Offense” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.