BITCQ

OWASP Top 10- API Security Playbook

Size: 200.3 MB
Magnet link

Name Size
OWASP Top 10- API Security Playbook/08. Security Misconfiguration/02. Common Security Misconfigurations.mp4 9.9 MB
OWASP Top 10- API Security Playbook/00. Course Overview/00. Course Overview.srt 2 KB
OWASP Top 10- API Security Playbook/01. Using the OWASP API Top 10/6 Simple Memory Techniques.html 98 B
OWASP Top 10- API Security Playbook/01. Using the OWASP API Top 10/00. Goals of the API Top 10.mp4 8 MB
OWASP Top 10- API Security Playbook/01. Using the OWASP API Top 10/00. Goals of the API Top 10.srt 8 KB
OWASP Top 10- API Security Playbook/01. Using the OWASP API Top 10/01. Vulnerability Risk Factors.mp4 5.7 MB
OWASP Top 10- API Security Playbook/01. Using the OWASP API Top 10/01. Vulnerability Risk Factors.srt 6 KB
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/00. Overview.mp4 3.1 MB
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/00. Overview.srt 3 KB
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/01. Attacking Broken Object Level Authorization.mp4 7.2 MB
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/01. Attacking Broken Object Level Authorization.srt 8 KB
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/02. Defending Against Broken Object Level Authorization.mp4 4.5 MB
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/02. Defending Against Broken Object Level Authorization.srt 5 KB
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/USB Rubber Ducky Deluxe.html 84 B
OWASP Top 10- API Security Playbook/03. Broken User Authentication/00. Understanding Broken Authorization.mp4 7.2 MB
OWASP Top 10- API Security Playbook/03. Broken User Authentication/00. Understanding Broken Authorization.srt 8 KB
OWASP Top 10- API Security Playbook/03. Broken User Authentication/01. Storing Passwords Securely.mp4 4.4 MB
OWASP Top 10- API Security Playbook/03. Broken User Authentication/01. Storing Passwords Securely.srt 5 KB
OWASP Top 10- API Security Playbook/03. Broken User Authentication/02. Credential Stuffing.mp4 3.3 MB
OWASP Top 10- API Security Playbook/03. Broken User Authentication/02. Credential Stuffing.srt 3 KB
OWASP Top 10- API Security Playbook/03. Broken User Authentication/03. Common JWT Failures.mp4 5.2 MB
OWASP Top 10- API Security Playbook/03. Broken User Authentication/03. Common JWT Failures.srt 5 KB
OWASP Top 10- API Security Playbook/03. Broken User Authentication/04. Using API Keys.mp4 4.6 MB
OWASP Top 10- API Security Playbook/03. Broken User Authentication/04. Using API Keys.srt 5 KB
OWASP Top 10- API Security Playbook/03. Broken User Authentication/Yubico - YubiKey 5 NFC.html 84 B
OWASP Top 10- API Security Playbook/04. Excessive Data Exposure/00. Overview.mp4 5.5 MB
OWASP Top 10- API Security Playbook/04. Excessive Data Exposure/00. Overview.srt 6 KB
OWASP Top 10- API Security Playbook/04. Excessive Data Exposure/01. Attacking Excessive Data Exposure.mp4 4.9 MB
OWASP Top 10- API Security Playbook/04. Excessive Data Exposure/01. Attacking Excessive Data Exposure.srt 5 KB
OWASP Top 10- API Security Playbook/04. Excessive Data Exposure/02. Defending Against Excessive Data Exposure.mp4 3.3 MB
OWASP Top 10- API Security Playbook/04. Excessive Data Exposure/02. Defending Against Excessive Data Exposure.srt 4 KB
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/00. Overview.mp4 3.8 MB
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/00. Overview.srt 4 KB
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/01. Attacks on Rate Limiting Vulnerabilities.mp4 5.7 MB
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/01. Attacks on Rate Limiting Vulnerabilities.srt 6 KB
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/02. Rate Limiting Risks.mp4 3.3 MB
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/02. Rate Limiting Risks.srt 3 KB
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/03. Rate Limiting Defenses.mp4 6.1 MB
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/03. Rate Limiting Defenses.srt 6 KB
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/00. Overview.mp4 3.3 MB
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/00. Overview.srt 3 KB
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/01. Attacks on Function Level Authorization.mp4 7.2 MB
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/01. Attacks on Function Level Authorization.srt 7 KB
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/02. Function Level Authorization Defenses.mp4 3.9 MB
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/02. Function Level Authorization Defenses.srt 4 KB
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/Linux Tails Operating System.html 84 B
OWASP Top 10- API Security Playbook/07. Mass Assignment/00. Overview.mp4 4.6 MB
OWASP Top 10- API Security Playbook/07. Mass Assignment/00. Overview.srt 5 KB
OWASP Top 10- API Security Playbook/07. Mass Assignment/01. Attacking Mass Assignment Vulnerabilities.mp4 4.7 MB
OWASP Top 10- API Security Playbook/07. Mass Assignment/01. Attacking Mass Assignment Vulnerabilities.srt 5 KB
OWASP Top 10- API Security Playbook/07. Mass Assignment/02. Mass Assignment Defenses.mp4 3.3 MB
OWASP Top 10- API Security Playbook/07. Mass Assignment/02. Mass Assignment Defenses.srt 4 KB
OWASP Top 10- API Security Playbook/08. Security Misconfiguration/00. Overview.mp4 7.6 MB
OWASP Top 10- API Security Playbook/08. Security Misconfiguration/00. Overview.srt 9 KB
OWASP Top 10- API Security Playbook/08. Security Misconfiguration/01. Understanding a Vulnerable CORS Implementation.mp4 7.9 MB
OWASP Top 10- API Security Playbook/08. Security Misconfiguration/01. Understanding a Vulnerable CORS Implementation.srt 8 KB
OWASP Top 10- API Security Playbook/00. Course Overview/00. Course Overview.mp4 3.3 MB
OWASP Top 10- API Security Playbook/08. Security Misconfiguration/02. Common Security Misconfigurations.srt 10 KB
OWASP Top 10- API Security Playbook/09. Injection/00. Overview.mp4 4 MB
OWASP Top 10- API Security Playbook/09. Injection/00. Overview.srt 4 KB
OWASP Top 10- API Security Playbook/09. Injection/01. Attacking Injection Vulnerabilities.mp4 7.6 MB
OWASP Top 10- API Security Playbook/09. Injection/01. Attacking Injection Vulnerabilities.srt 8 KB
OWASP Top 10- API Security Playbook/09. Injection/02. Injection Risks.mp4 4.9 MB
OWASP Top 10- API Security Playbook/09. Injection/02. Injection Risks.srt 4 KB
OWASP Top 10- API Security Playbook/09. Injection/03. Injection Defenses.mp4 9.9 MB
OWASP Top 10- API Security Playbook/09. Injection/03. Injection Defenses.srt 10 KB
OWASP Top 10- API Security Playbook/10. Improper Assets Management/00. Overview.mp4 4.2 MB
OWASP Top 10- API Security Playbook/10. Improper Assets Management/00. Overview.srt 4 KB
OWASP Top 10- API Security Playbook/10. Improper Assets Management/01. Attacks on Improper Asset Management.mp4 9.2 MB
OWASP Top 10- API Security Playbook/10. Improper Assets Management/01. Attacks on Improper Asset Management.srt 8 KB
OWASP Top 10- API Security Playbook/10. Improper Assets Management/02. Defending Your Assets.mp4 5.7 MB
OWASP Top 10- API Security Playbook/10. Improper Assets Management/02. Defending Your Assets.srt 6 KB
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/00. Overview.mp4 4.7 MB
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/00. Overview.srt 5 KB
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/01. Effects of Insufficient Logging and Monitoring.mp4 3.4 MB
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/01. Effects of Insufficient Logging and Monitoring.srt 3 KB
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/02. Logging and Monitoring for Defense.mp4 4.9 MB
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/02. Logging and Monitoring for Defense.srt 5 KB
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/LIFX 1100-Lumen.html 84 B
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html 84 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...