Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt

Znajdź zawartość

Wyświetlanie wyników dla tagów 'offensive' .



Więcej opcji wyszukiwania

  • Wyszukaj za pomocą tagów

    Wpisz tagi, oddzielając je przecinkami.
  • Wyszukaj przy użyciu nazwy użytkownika

Typ zawartości


Forum

  • DarkSiders
    • Dołącz do Ekipy forum jako
    • Ogłoszenia
    • Propozycje i pytania
    • Help
    • Poradniki / Tutoriale
    • Wszystko o nas
  • Poszukiwania / prośby
    • Generowanie linków
    • Szukam
  • DSTeam no Limits (serwery bez limitów!)
  • Download
    • Kolekcje
    • Filmy
    • Muzyka
    • Gry
    • Programy
    • Ebooki
    • GSM
    • Erotyka
    • Inne
  • Hydepark
  • UPandDOWN-Lader Tematy

Szukaj wyników w...

Znajdź wyniki, które zawierają...


Data utworzenia

  • Od tej daty

    Do tej daty


Ostatnia aktualizacja

  • Od tej daty

    Do tej daty


Filtruj po ilości...

Dołączył

  • Od tej daty

    Do tej daty


Grupa podstawowa


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Gadu Gadu


Skąd


Interests


Interests


Polecający

Znaleziono 5 wyników

  1. Free Download Udemy - Breaking Apis An Offensive Api Pentesting Course Published 10/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 2.23 GB | Duration: 5h 13m Offensive API Pentesting: Identify Vulnerabilities, Attack Weaknesses, and Enhance Defenses With Offensive Pentesting. What you'll learn Understand API Security Concepts Identify and Exploit Common API Vulnerabilities Perform Advanced API Pentesting Techniques Report Findings and Provide Remediation Recommendations Requirements Basic Understanding of Web Technologies Knowledge of Cybersecurity Concepts Basic Understanding of Web Vulnerabilities Description APIs are the backbone of modern applications, enabling seamless interactions between services. However, their increasing presence makes them a prime target for attackers. "Breaking APIs: An Offensive API Pentesting Course" is designed to equip you with the offensive API pentesting skills necessary to find and exploit security flaws before malicious actors do.This course begins with the fundamentals of API architecture and HTTP protocols, followed by hands-on techniques for API enumeration and testing. You will explore essential tools like Postman and Burp Suite, learning how to map APIs and uncover potential weaknesses. Progressing into more advanced concepts, you will dive into common API security vulnerabilities, such as broken authentication, broken authorization, and misconfigurations.The course aligns with the OWASP API Security Top 10, tackling real-world vulnerabilities like Broken Object Level Authorization (BOLA), excessive data exposure, mass assignment, injection attacks, and improper asset management. Each module is designed to give you practical, hands-on experience in finding and exploiting these vulnerabilities, reinforcing your skills through detailed labs and challenges.Whether you're a penetration tester, security analyst, or developer, "Breaking APIs: An Offensive API Pentesting Course" will arm you with the skills and knowledge to secure APIs in today's threat landscape. By the end of this course, you will be prepared to conduct thorough API pentests, identify security risks, and protect sensitive data from emerging threats. Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 Introduction to API's Lecture 3 What are REST API's ? Lecture 4 Web Application Fundamentals Lecture 5 Statefull and Stateless HTTP Reqests Lecture 6 Types of API's Lecture 7 API Authentication Process Section 2: What Is API Pentesting ? Lecture 8 What Is API Pentesting ? Section 3: Lab Setup Lecture 9 Lab Setup and Lab Overview Section 4: Tools Setup Lecture 10 Burpsuite Configurations Lecture 11 Postman Dowload and Setup Lecture 12 Postman Introduction Section 5: Active and Passive Recon Lecture 13 Introduction Of Active and Passive Recon Lecture 14 Active Recon Lecture 15 Passive Recon Section 6: API Endpoint Analysis Lecture 16 API Endpoint Analysis Section 7: Broken Object Level Authorization Lecture 17 Broken Object Level Authorization Overview Lecture 18 Broken Object Level Authorization Practical #1 Lecture 19 Broken Object Level Authorization Practical #2 Lecture 20 Task Section 8: Broken Authentication Lecture 21 Broken Authentication Overview Lecture 22 Broken Authentication Practical #1 Lecture 23 Broken Authentication Practical #2 Lecture 24 Task Lecture 25 JSON Web Token Attacks and Vulnerabilities Overview Lecture 26 JSON Web Token Attacks Practical Section 9: Broken Function Level Authorization Lecture 27 Broken Function Level Authorization Overview Lecture 28 Broken Function Level Authorization Practical #1 Lecture 29 Broken Function Level Authorization Practical #2 Lecture 30 Task Section 10: Server Side Request Forgery Lecture 31 Server Side Request Forgery Overview Lecture 32 Server Side Request Forgery Practical #1 Lecture 33 Server Side Request Forgery Practical #2 Lecture 34 Task Section 11: Excessive Data Exposoure Lecture 35 Excessive Data Exposure Overview Lecture 36 Excessive Data Exposure Practical #1 Lecture 37 Excessive Data Exposure Practical #2 Lecture 38 Task Section 12: Lack of Resource and Rate Limiting Lecture 39 Lack of Resource and Rate Limiting Overview Lecture 40 Lack of Resource and Rate Limiting Practical #1 Lecture 41 Lack of Resource and Rate Limiting Practical #2 Lecture 42 Task Section 13: Mass Assignment Lecture 43 Mass Assignment Overview Lecture 44 Mass Assignment Practical #1 Lecture 45 Mass Assignment Practical #2 Lecture 46 Task Section 14: Injection Attacks Lecture 47 Injection Attacks Overview Lecture 48 Injection Attacks Practical #1 Lecture 49 Injection Attacks Practical #2 Lecture 50 Task Section 15: Improper Assets Management Lecture 51 Improper Assets Management Overview Lecture 52 Improper Assets Management Practical #1 Lecture 53 Improper Assets Management Practical #2 Lecture 54 Task Section 16: Security Misconfigurations Lecture 55 Security Misconfigurations Overview Lecture 56 Security Misconfigurations Practical #1 Lecture 57 Security Misconfigurations Practical #2 Lecture 58 Task Section 17: Insufficient Logging and Monitoring Lecture 59 Insufficient Logging and Monitoring Overview Lecture 60 Insufficient Logging and Monitoring Practical #1 Lecture 61 Task Section 18: Bonus Lecture 62 Bonus lecture Security Consultants,Penetration Testers,Developers and DevOps Engineers,Cybersecurity Professionals Homepage https://www.udemy.com/course/breaking-apis-an-offensive-api-pentesting-course/ Rapidgator https://rg.to/file/0ed854d242f5561466ae6e09cc071ff6/imtpy.Breaking.Apis.An.Offensive.Api.Pentesting.Course.part1.rar.html https://rg.to/file/6d8585c52020e70623b83e9a53a55052/imtpy.Breaking.Apis.An.Offensive.Api.Pentesting.Course.part2.rar.html https://rg.to/file/25c72b101cadbd68313251b8a24b6641/imtpy.Breaking.Apis.An.Offensive.Api.Pentesting.Course.part3.rar.html Fikper Free Download https://fikper.com/PKBzSGcqT0/imtpy.Breaking.Apis.An.Offensive.Api.Pentesting.Course.part1.rar https://fikper.com/3UJBufMKy2/imtpy.Breaking.Apis.An.Offensive.Api.Pentesting.Course.part2.rar https://fikper.com/oUINCmek1p/imtpy.Breaking.Apis.An.Offensive.Api.Pentesting.Course.part3.rar No Password - Links are Interchangeable
  2. Free Download Spring Offensive: Home Front Detective by Edward Marston, Gordon Griffin, Soundings English | June 20, 2024 | ISBN: B0D2DVJ123 | 10 hours and 9 minutes | M4B 64 Kbps | 279 Mb March, 1918. British newspapers carry the dreadful news that the German Spring Offensive has begun, with thousands of British lives lost. Detective Sargeant Joe Keedy is awaiting release from hospital in London and is anxious to resume the fight against crime on the Home Front. Late one night, a bank is raided by a gang and the villains escape by car with a sizeable haul. Detective Inspector Harvey Marmion is put in charge of the case, but without Keedy at his side he faces an uphill battle to solve this perplexing case. Rapidgator https://rg.to/file/7d7a56c2ba255def8fce63ef4af107ce/89s38.rar.html Fikper Free Download https://fikper.com/DhlkGFXbvQ/89s38.rar.html Links are Interchangeable - No Password - Single Extraction
  3. Offensive Computer Security (CIS4930 - CIS5930) Spring 2014 Lectures & Videos English | mp4 | H264 1126x720 | AAC 2 ch | PDF, pptx | 7.14 Gb Genre: eLearning The primary incentive for an attacker to exploit a vulnerability, or series of vulnerabilities is to achieve a return on an investment (his/her time usually). This return need not be strictly monetary-an attacker may be interested in obtaining access to data, identities, or some other commodity that is valuable to them. The field of penetration testing involves authorized auditing and exploitation of systems to assess actual system security in order to protect against attackers. This requires thorough knowledge of vulnerabilities and how to exploit them. Thus, this course provides an introductory but comprehensive coverage of the fundamental methodologies, skills, legal issues, and tools used in white hat penetration testing, secure system administration, and incident response. DOWNLOAD http://rapidgator.net/file/990006918c459fa2992c2e6ccb41fd0d/Spring.part1.rar.html http://rapidgator.net/file/37a4d15b7514b1994b5bdab892aa1e47/Spring.part2.rar.html http://rapidgator.net/file/934f46da61943da28e3e6f6f44b4688b/Spring.part3.rar.html http://rapidgator.net/file/c2f35ad763701c69049c5a375f6c4495/Spring.part4.rar.html http://rapidgator.net/file/0d909d8e3964f77b791f5763ace56f2f/Spring.part5.rar.html http://rapidgator.net/file/ba8478c7208ccf67e1ced34b602ad20b/Spring.part6.rar.html http://rapidgator.net/file/9e65e66b4e46ee2602cf5984d43f8e04/Spring.part7.rar.html http://rapidgator.net/file/7b7ec18474dd87bf5c0f90ee7db8dbcc/Spring.part8.rar.html http://uploaded.net/file/1ozfxoms/Spring.part1.rar http://uploaded.net/file/xf6u7loa/Spring.part2.rar http://uploaded.net/file/rz41zmor/Spring.part3.rar http://uploaded.net/file/h11rytn0/Spring.part4.rar http://uploaded.net/file/h6y8js86/Spring.part5.rar http://uploaded.net/file/6599d3ef/Spring.part6.rar http://uploaded.net/file/ldhkoMbf/Spring.part7.rar http://uploaded.net/file/ehsuqi9d/Spring.part8.rar http://www.uploadable.ch/file/v7wvEFynxc3f/Spring.part1.rar http://www.uploadable.ch/file/mE5st6pFp3rs/Spring.part2.rar http://www.uploadable.ch/file/AhqpuV9t9Nmr/Spring.part3.rar http://www.uploadable.ch/file/ups4r8DQzsHn/Spring.part4.rar http://www.uploadable.ch/file/7mtBmk5bMkFK/Spring.part5.rar http://www.uploadable.ch/file/vtDvjpu6ewbT/Spring.part6.rar http://www.uploadable.ch/file/UpQmtmr8j6Fn/Spring.part7.rar http://www.uploadable.ch/file/SysC3jvmeQnd/Spring.part8.rar
  4. Offensive Computer Security (CIS4930 - CIS5930) Spring 2014 Lectures & Videos English | mp4 | H264 1126x720 | AAC 2 ch | pdf, pptx | 7.14 GB eLearning The primary incentive for an attacker to exploit a vulnerability, or series of vulnerabilities is to achieve a return on an investment (his/her time usually). This return need not be strictly monetary-an attacker may be interested in obtaining access to data, identities, or some other commodity that is valuable to them. The field of penetration testing involves authorized auditing and exploitation of systems to assess actual system security in order to protect against attackers. This requires thorough knowledge of vulnerabilities and how to exploit them. Thus, this course provides an introductory but comprehensive coverage of the fundamental methodologies, skills, legal issues, and tools used in white hat penetration testing, secure system administration, and incident response. Download From Uploaded http://uploaded.net/file/dk5xe6dw/xidau123_spring2014lv.part01.rar http://uploaded.net/file/grpp5s0e/xidau123_spring2014lv.part02.rar http://uploaded.net/file/6rg3y84a/xidau123_spring2014lv.part03.rar http://uploaded.net/file/fwqf75w5/xidau123_spring2014lv.part04.rar http://uploaded.net/file/fcxjt7xq/xidau123_spring2014lv.part05.rar http://uploaded.net/file/m11np8uf/xidau123_spring2014lv.part06.rar http://uploaded.net/file/joopxhuz/xidau123_spring2014lv.part07.rar http://uploaded.net/file/ojjejq1r/xidau123_spring2014lv.part08.rar http://uploaded.net/file/5yiejgp4/xidau123_spring2014lv.part09.rar Download From NitroFlare http://www.nitroflare.com/view/C60ACFD80FB1643/xidau123_spring2014lv.part01.rar http://www.nitroflare.com/view/F687BBBC12F82BA/xidau123_spring2014lv.part02.rar http://www.nitroflare.com/view/CCFC5309B13ADDE/xidau123_spring2014lv.part03.rar http://www.nitroflare.com/view/A7E7A77FC700078/xidau123_spring2014lv.part04.rar http://www.nitroflare.com/view/A9BB90461778C21/xidau123_spring2014lv.part05.rar http://www.nitroflare.com/view/9E8903996F5E9C4/xidau123_spring2014lv.part06.rar http://www.nitroflare.com/view/0C5B3107BB9AA92/xidau123_spring2014lv.part07.rar http://www.nitroflare.com/view/361EE78B73EDC96/xidau123_spring2014lv.part08.rar http://www.nitroflare.com/view/406C62385D41BC8/xidau123_spring2014lv.part09.rar Download From Rapidgator http://rapidgator.net/file/9f464d1e5f0c16305e2a1869530f890b/xidau123_spring2014lv.part01.rar.html http://rapidgator.net/file/6ea68a3f7e3c0fd3582c775292aa010f/xidau123_spring2014lv.part02.rar.html http://rapidgator.net/file/7c50b70dc0c9de47ea1b7c866dbc8ef6/xidau123_spring2014lv.part03.rar.html http://rapidgator.net/file/69f71c721806ee4dc7479c4345b6d862/xidau123_spring2014lv.part04.rar.html http://rapidgator.net/file/da4ef3889a48d6fc0bb40779c3167d5f/xidau123_spring2014lv.part05.rar.html http://rapidgator.net/file/e0486db960cf7fa5b9cdb6aaaa25c624/xidau123_spring2014lv.part06.rar.html http://rapidgator.net/file/f8ea3910de29ff91a420fc0d4002da3e/xidau123_spring2014lv.part07.rar.html http://rapidgator.net/file/5a77640307cf33bf57715c260893c971/xidau123_spring2014lv.part08.rar.html http://rapidgator.net/file/7c66583a276d4a1e628f05ccfd53d4f8/xidau123_spring2014lv.part09.rar.html
  5. John Jackson Miller - Overdraft: The Orion Offensive Unabridged AudioBook | 2013 | Genre: Science Fiction | English | ISBN-13: 9781477807521 | MP3 64Kb | Length: 11 hrs and 26 mins | 314.99 MB After an egotistical stock trader for one of the twenty-second century's biggest corporations gets greedy and loses his employer a fortune, he has two options: go to jail or make the money back before anyone notices. Unfortunately, the only place such profits can be found is the galactic frontier, a region so dangerous it'll take an uneasy alliance with a crew of rugged mercenaries to keep him alive and in the black. You'd have to be insane to trade with the violent denizens of the Orion Arm, but with just one hundred days to recoup $100 billion, Jamie Sturm is feeling a little crazy. Standing between Jamie and a variety of agonizing deaths is Surge Team Sigma, the squad of power-armored mercenaries tasked with protecting him. Their last job ended in disaster thanks to Jamie's scheming, and, led by the implacable Bridget Yang, the team is determined to keep the hapless Jamie alive long enough to fix their reputation. That is, assuming they can ignore their own growing desire to flush the annoying tagalong out of the nearest airlock. Download Link http://rapidgator.net/file/571943146ad0592ec351f9f05a5d1850/Overdraft.part1.rar.html http://rapidgator.net/file/20cfda7ee04118045f85de6f245849ae/Overdraft.part2.rar.html http://rapidgator.net/file/7bc5ab9425f4759c31ceab2a81ce67e9/Overdraft.part3.rar.html http://rapidgator.net/file/2629bafb29affc9a52c14e4a7d3065bd/Overdraft.part4.rar.html
×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.