Filename Size 01 - Overview.mp4 4.2 MB 02 - The State of Web Application Security.mp4 5.2 MB 03 - Understanding Web Application Security.mp4 11.2 MB 04 - Query Strings, Routing, and HTTP Verbs.mp4 11.5 MB 05 - The Discoverability of Client Security Constructs.mp4 18.2 MB 06 - Protections Offered by Browsers.mp4 16.6 MB 07 - What the Browser Can't Defend Against.mp4 3.7 MB 08 - What's Not Covered in This Course.mp4 2.1 MB 09 - Summary.mp4 3.2 MB 10 - Overview.mp4 3.5 MB 11 - Spidering with NetSparker.mp4 25.6 MB 12 - Forced Browsing with Burp Suite.mp4 26.5 MB 13 - Directory Traversal.mp4 36.7 MB 14 - Banner Grabbing with Wget.mp4 5.5 MB 15 - Server Fingerprinting with Nmap.mp4 8.1 MB 16 - Discovery of Development Artefacts with Acunetix.mp4 18.7 MB 17 - Discovery of Services via Generated Documentation.mp4 13 MB 18 - Discovering Framework Risks.mp4 18.1 MB 19 - Identifying Vulnerable Targets with Shodan.mp4 8.5 MB 20 - Summary.mp4 2.5 MB 21 - Overview.mp4 3.2 MB 22 - OWASP and the Top 10 Web Application Security Risks.mp4 9.1 MB 23 - Understanding Untrusted Data.mp4 8.5 MB 24 - Parameter Tampering.mp4 17.1 MB 25 - Hidden Field Tampering.mp4 9.9 MB 26 - Mass Assignment Attacks.mp4 10.2 MB 27 - Cookie Poisoning.mp4 9.2 MB 28 - Insecure Direct Object References.mp4 12.4 MB 29 - Defending Against Tampering.mp4 6.1 MB 30 - Summary.mp4 2.2 MB 31 - Overview.mp4 3.1 MB 32 - Reflected Cross Site Scripting (XSS).mp4 34 MB 33 - Persistent Cross Site Scripting (XSS).mp4 15.7 MB 34 - Defending Against XSS Attacks.mp4 5 MB 35 - Identifying XSS Risks and Evading Filters.mp4 12.8 MB 36 - Client Only Validation.mp4 18.1 MB 37 - Insufficient Transport Layer Security.mp4 27.2 MB 38 - Cross Site Request Forgery (CSRF).mp4 25.7 MB 39 - Summary.mp4 4.1 MB 40 - Overview.mp4 4.8 MB 41 - Understanding Weaknesses in Identity Management.mp4 5 MB 42 - Identity Enumeration.mp4 18.7 MB 43 - Weaknesses in the 'Remember Me' Feature.mp4 18.2 MB 44 - Resources Missing Access Controls.mp4 10.7 MB 45 - Insufficient Access Controls.mp4 13.7 MB 46 - Privilege Elevation.mp4 11.6 MB 47 - Summary.mp4 3.4 MB 48 - Overview.mp4 3.7 MB 49 - Understanding DoS.mp4 6.6 MB 50 - Exploiting Password Resets.mp4 3.9 MB 51 - Exploiting Account Lockouts.mp4 6.8 MB 52 - Distributed Denial of Service (DDoS).mp4 28.6 MB 53 - Automating DDoS Attacks with LOIC.mp4 15.9 MB 54 - DDoS as a Service.mp4 10.3 MB 55 - Features at Risk of a DDoS Attack.mp4 6.5 MB 56 - Other DDoS Attacks and Mitigations.mp4 12.7 MB 57 - Summary.mp4 4.5 MB 58 - Overview.mp4 4.4 MB 59 - Improper Error Handling.mp4 39.8 MB 60 - Understanding Salted Hashes.mp4 7.6 MB 61 - Insecure Cryptographic Storage.mp4 34.2 MB 62 - Unvalidated Redirects and Forwards.mp4 16.7 MB 63 - Exposed Exceptions Logs with ELMAH.mp4 21.7 MB 64 - Vulnerabilities in Web Services.mp4 14 MB 65 - Summary.mp4 5 MB Udemy Course downloader.txt 94 B