TorBT - Torrents and Magnet Links Search Engine

[OneHack.Us] Pluralsight - Advanced Web Application Penetration Testing with Burp Suite

File Name
Size
1-Course Overview/1 -Course Overview.mp4
6.0 MB
2-Setting up Your Burp Suite Environment for This Course/2 -Audience and Purpose.mp4
1007 kB
2-Setting up Your Burp Suite Environment for This Course/3 -Rules of Engagement.mp4
8.5 MB
2-Setting up Your Burp Suite Environment for This Course/4 -Free vs. Professional Editions.mp4
1.4 MB
2-Setting up Your Burp Suite Environment for This Course/5 -Setting up Your Project File.mp4
2.8 MB
2-Setting up Your Burp Suite Environment for This Course/6 -Setting up Your Options Configurations.mp4
4.3 MB
3-Hybrid Spidering Your Web Application/00. Support - Onehack.Us.txt
94 B
3-Hybrid Spidering Your Web Application/10 -Spidering Your Scoped Target.mp4
8.5 MB
3-Hybrid Spidering Your Web Application/11 -Privilege Escalation Discovery.mp4
5.8 MB
3-Hybrid Spidering Your Web Application/12 -Crawling with Tasks and Scans.mp4
19 MB
3-Hybrid Spidering Your Web Application/13 -Auditing Options in Burp 2.mp4
26 MB
3-Hybrid Spidering Your Web Application/14 -Directory Brute-forcing.mp4
4.0 MB
3-Hybrid Spidering Your Web Application/15 -Scanning Your Target.mp4
4.7 MB
3-Hybrid Spidering Your Web Application/7 -Gray Box Testing.mp4
5.2 MB
3-Hybrid Spidering Your Web Application/8 -Scoping Your Target.mp4
2.5 MB
3-Hybrid Spidering Your Web Application/9 -Using Advanced Scope.mp4
8.5 MB
4-Exploiting Vulnerabilities in Your Web Application/16 -Using Burp to Find Common Vulnerabilities.mp4
3.2 MB
4-Exploiting Vulnerabilities in Your Web Application/17 -Using Burp to Perform SQL Injection (SQLi) Attacks.mp4
9.2 MB
4-Exploiting Vulnerabilities in Your Web Application/18 -Using Burp to Perform XSS Injection Attacks.mp4
5.1 MB
4-Exploiting Vulnerabilities in Your Web Application/19 -Using Burp to Uncover Cookie Session Management Issues.mp4
5.7 MB
4-Exploiting Vulnerabilities in Your Web Application/20 -Using Burp to Perform Parameter Tampering.mp4
8.8 MB
4-Exploiting Vulnerabilities in Your Web Application/21 -Using Burp to Perform Cross-site Request Forgery (CSRF) Attacks.mp4
7.2 MB
4-Exploiting Vulnerabilities in Your Web Application/22 -Using Burp to Determine Clickjacking Vulnerabilities.mp4
4.4 MB
4-Exploiting Vulnerabilities in Your Web Application/23 -Using Burp Collaborator.mp4
17 MB
5-Integrating Burp and File Attacks/24 -Burp Extenders Explained.mp4
4.4 MB
5-Integrating Burp and File Attacks/25 -Burp Extenders Sampling.mp4
7.6 MB
5-Integrating Burp and File Attacks/26 -Burp and File Uploads.mp4
2.7 MB
5-Integrating Burp and File Attacks/27 -Burp and File Downloads.mp4
3.6 MB
6-Writing Your Own Burp Extension and Exercising Automation/28 -Custom Burp Plugins.mp4
16 MB
6-Writing Your Own Burp Extension and Exercising Automation/29 -Automating Burp.mp4
4.6 MB
6-Writing Your Own Burp Extension and Exercising Automation/Onehack.Us.txt
94 B
Support - Onehack.Us.txt
94 B
advanced-web-application-penetration-testing-burp-suite.zip
1.1 MB