elhacker.INFO Downloads
Name Last modified Size
Parent Directory -
00001 Security_Penetration_Testing_for_Today_s_DevOps_and_Cloud_Environments_-_Introduction.mp4 2024-01-31 17:13 178M
00002 Learning_objectives.mp4 2024-01-31 17:13 71M
00003 1.1_Understanding_Ethical_Hacking_and_Penetration_Testing.mp4 2024-01-31 17:14 44M
00004 1.2_Surveying_Web_Application_Penetration_Testing_Methodologies.mp4 2024-01-31 17:13 133M
00005 1.3_Understanding_the_Need_for_Web_Application_Penetration_Testing.mp4 2024-01-31 17:14 75M
00006 1.4_Exploring_How_Web_Applications_Have_Evolved_Over_Time.mp4 2024-01-31 17:14 123M
00007 1.5_Exploring_What_Programming_Languages_You_Should_Know.mp4 2024-01-31 17:14 167M
00008 Learning_objectives.mp4 2024-01-31 17:15 72M
00009 2.1_Understanding_the_Web_Application_Protocols.mp4 2024-01-31 17:15 219M
00010 2.2_Exploring_the_HTTP_Request_and_Response.mp4 2024-01-31 17:15 167M
00011 2.3_Surveying_Session_Management_and_Cookies.mp4 2024-01-31 17:15 231M
00012 2.4_Introducing_DevOps.mp4 2024-01-31 17:16 74M
00013 2.5_Exploring_Cloud_Services.mp4 2024-01-31 17:16 108M
00014 2.6_Exploring_Web_Application_Frameworks.mp4 2024-01-31 17:16 69M
00015 2.7_Surveying_Docker_Containers.mp4 2024-01-31 17:16 182M
00016 2.8_Introducing_Kubernetes.mp4 2024-01-31 17:16 96M
00017 Learning_objectives.mp4 2024-01-31 17:18 78M
00018 3.1_Exploring_Kali_Linux.mp4 2024-01-31 17:17 559M
00019 3.2_Introducing_Vulnerable_Applications.mp4 2024-01-31 17:18 57M
00020 3.3_Surveying_DVWA.mp4 2024-01-31 17:18 51M
00021 3.4_Surveying_WebGoat.mp4 2024-01-31 17:18 64M
00022 3.5_Surveying_Hackazon.mp4 2024-01-31 17:18 100M
00023 3.6_Exploring_the_Web_Security_Dojo.mp4 2024-01-31 17:19 105M
00024 3.7_Understanding_Web_Application_Proxies.mp4 2024-01-31 17:19 109M
00025 3.8_Understanding_Cyber_Ranges_and_Capture_the_Flag_Events.mp4 2024-01-31 17:19 109M
00026 Learning_objectives.mp4 2024-01-31 17:19 88M
00027 4.1_Understanding_Passive_vs._Active_Reconnaissance.mp4 2024-01-31 17:20 131M
00028 4.2_Using_Search_Engines_and_Public_Information.mp4 2024-01-31 17:20 162M
00029 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 2024-01-31 17:21 488M
00030 4.4_Exploring_CMS_and_Framework_Identification.mp4 2024-01-31 17:21 134M
00031 4.5_Surveying_Web_Crawlers_and_Directory_Brute_Force.mp4 2024-01-31 17:22 152M
00032 4.6_Understanding_How_Web_Application_Scanners_Work.mp4 2024-01-31 17:22 64M
00033 4.7_Introducing_Nikto.mp4 2024-01-31 17:22 117M
00034 4.8_Introducing_the_Burp_Suite.mp4 2024-01-31 17:23 524M
00035 4.9_Introducing_OWASP_Zed_Application_Proxy_ZAP.mp4 2024-01-31 17:23 170M
00036 4.10_Introducing_OpenVAS.mp4 2024-01-31 17:24 266M
00037 Learning_objectives.mp4 2024-01-31 17:24 38M
00038 5.1_Understanding_Authentication_Schemes_in_Web_Applications_and_Related_Vulnerabilities.mp4 2024-01-31 17:25 699M
00039 5.2_Exploring_Session_Management_Mechanisms_and_Related_Vulnerabilities.mp4 2024-01-31 17:26 439M
00040 Learning_objectives.mp4 2024-01-31 17:26 54M
00041 6.1_Understanding_Command_Injection.mp4 2024-01-31 17:26 68M
00042 6.2_Exploiting_Command_Injection_Vulnerabilities.mp4 2024-01-31 17:26 97M
00043 6.3_Understanding_SQL_Injection.mp4 2024-01-31 17:26 169M
00044 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 2024-01-31 17:27 808M
00045 6.5_Understanding_XML_Injection.mp4 2024-01-31 17:28 47M
00046 6.6_Exploiting_XML_Injection_Vulnerabilities.mp4 2024-01-31 17:28 81M
00047 6.7_Mitigating_Injection_Vulnerabilities.mp4 2024-01-31 17:28 79M
00048 Learning_objectives.mp4 2024-01-31 17:28 72M
00049 7.1_Introducing_XSS.mp4 2024-01-31 17:28 41M
00050 7.2_Exploiting_Reflected_XSS_Vulnerabilities.mp4 2024-01-31 17:28 82M
00051 7.3_Exploiting_Stored_XSS_Vulnerabilities.mp4 2024-01-31 17:28 106M
00052 7.4_Exploiting_DOM-based_XSS_Vulnerabilities.mp4 2024-01-31 17:29 108M
00053 7.5_Understanding_Cross-Site_Request_Forgery_CSRF.mp4 2024-01-31 17:29 42M
00054 7.6_Exploiting_CSRF_Vulnerabilities.mp4 2024-01-31 17:29 72M
00055 7.7_Evading_Web_Application_Security_Controls.mp4 2024-01-31 17:29 185M
00056 7.8_Mitigating_XSS_and_CSRF_Vulnerabilities.mp4 2024-01-31 17:29 240M
00057 Learning_objectives.mp4 2024-01-31 17:30 59M
00058 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 2024-01-31 17:31 722M
00059 8.2_Identifying_Common_Flaws_in_Data_Storage_and_Transmission.mp4 2024-01-31 17:31 289M
00060 8.3_Surveying_Examples_of_Crypto-based_Attacks_and_Vulnerabilities.mp4 2024-01-31 17:32 136M
00061 8.4_Mitigating_Flaws_in_Cryptographic_Implementations.mp4 2024-01-31 17:32 103M
00062 Learning_objectives.mp4 2024-01-31 17:32 29M
00063 9.1_Understanding_the_APIs.mp4 2024-01-31 17:32 94M
00064 9.2_Exploring_the_Tools_Used_to_Test_the_APIs.mp4 2024-01-31 17:32 139M
00065 Learning_objectives.mp4 2024-01-31 17:32 36M
00066 10.1_Surveying_the_Client-side_Code_and_Storage.mp4 2024-01-31 17:33 187M
00067 10.2_Understanding_HTML5_Implementations.mp4 2024-01-31 17:33 212M
00068 10.3_Understanding_AJAX_Implementations.mp4 2024-01-31 17:33 80M
00069 10.4_Mitigating_AJAX_HTML5_and_Client-side_Vulnerabilities.mp4 2024-01-31 17:33 59M
00070 Learning_objectives.mp4 2024-01-31 17:34 54M
00071 11.1_Understanding_the_Other_Common_Security_Flaws_in_Web_Applications.mp4 2024-01-31 17:34 132M
00072 11.2_Exploiting_Insecure_Direct_Object_References_and_Path_Traversal.mp4 2024-01-31 17:34 309M
00073 11.3_Surveying_Information_Disclosure_Vulnerabilities.mp4 2024-01-31 17:34 52M
00074 11.4_Fuzzing_Web_Applications.mp4 2024-01-31 17:35 297M
00075 Summary.mp4 2024-01-31 17:35 108M