OWASP Top 10- API Security Playbook
大小
200.32 MB
文件数
80
Info Hash:
888FC1A8182D9074204F3EBF6A77722CE01A231A
收录时间
2026-02-26 05:04:39
更新时间
2026-02-26 05:50:25
文件列表 (80)
08. Security Misconfiguration/02. Common Security Misconfigurations.mp4
9.95 MB
00. Course Overview/00. Course Overview.srt
2.31 KB
01. Using the OWASP API Top 10/6 Simple Memory Techniques.html
98 B
01. Using the OWASP API Top 10/00. Goals of the API Top 10.mp4
8.04 MB
01. Using the OWASP API Top 10/00. Goals of the API Top 10.srt
7.79 KB
01. Using the OWASP API Top 10/01. Vulnerability Risk Factors.mp4
5.66 MB
01. Using the OWASP API Top 10/01. Vulnerability Risk Factors.srt
6.34 KB
02. Broken Object Level Authorization/00. Overview.mp4
3.12 MB
02. Broken Object Level Authorization/00. Overview.srt
3.45 KB
02. Broken Object Level Authorization/01. Attacking Broken Object Level Authorization.mp4
7.22 MB
02. Broken Object Level Authorization/01. Attacking Broken Object Level Authorization.srt
7.87 KB
02. Broken Object Level Authorization/02. Defending Against Broken Object Level Authorization.mp4
4.49 MB
02. Broken Object Level Authorization/02. Defending Against Broken Object Level Authorization.srt
4.83 KB
02. Broken Object Level Authorization/USB Rubber Ducky Deluxe.html
84 B
03. Broken User Authentication/00. Understanding Broken Authorization.mp4
7.24 MB
03. Broken User Authentication/00. Understanding Broken Authorization.srt
7.75 KB
03. Broken User Authentication/01. Storing Passwords Securely.mp4
4.42 MB
03. Broken User Authentication/01. Storing Passwords Securely.srt
5.03 KB
03. Broken User Authentication/02. Credential Stuffing.mp4
3.3 MB
03. Broken User Authentication/02. Credential Stuffing.srt
3.02 KB
03. Broken User Authentication/03. Common JWT Failures.mp4
5.22 MB
03. Broken User Authentication/03. Common JWT Failures.srt
5.49 KB
03. Broken User Authentication/04. Using API Keys.mp4
4.6 MB
03. Broken User Authentication/04. Using API Keys.srt
5.23 KB
03. Broken User Authentication/Yubico - YubiKey 5 NFC.html
84 B
04. Excessive Data Exposure/00. Overview.mp4
5.5 MB
04. Excessive Data Exposure/00. Overview.srt
5.67 KB
04. Excessive Data Exposure/01. Attacking Excessive Data Exposure.mp4
4.87 MB
04. Excessive Data Exposure/01. Attacking Excessive Data Exposure.srt
5.03 KB
04. Excessive Data Exposure/02. Defending Against Excessive Data Exposure.mp4
3.29 MB
04. Excessive Data Exposure/02. Defending Against Excessive Data Exposure.srt
3.8 KB
05. Lack of Resource and Rate Limiting/00. Overview.mp4
3.79 MB
05. Lack of Resource and Rate Limiting/00. Overview.srt
4.29 KB
05. Lack of Resource and Rate Limiting/01. Attacks on Rate Limiting Vulnerabilities.mp4
5.68 MB
05. Lack of Resource and Rate Limiting/01. Attacks on Rate Limiting Vulnerabilities.srt
5.71 KB
05. Lack of Resource and Rate Limiting/02. Rate Limiting Risks.mp4
3.28 MB
05. Lack of Resource and Rate Limiting/02. Rate Limiting Risks.srt
3.29 KB
05. Lack of Resource and Rate Limiting/03. Rate Limiting Defenses.mp4
6.07 MB
05. Lack of Resource and Rate Limiting/03. Rate Limiting Defenses.srt
5.95 KB
06. Broken Function Level Authorization/00. Overview.mp4
3.25 MB
06. Broken Function Level Authorization/00. Overview.srt
3.26 KB
06. Broken Function Level Authorization/01. Attacks on Function Level Authorization.mp4
7.24 MB
06. Broken Function Level Authorization/01. Attacks on Function Level Authorization.srt
7.36 KB
06. Broken Function Level Authorization/02. Function Level Authorization Defenses.mp4
3.89 MB
06. Broken Function Level Authorization/02. Function Level Authorization Defenses.srt
4.17 KB
06. Broken Function Level Authorization/Linux Tails Operating System.html
84 B
07. Mass Assignment/00. Overview.mp4
4.57 MB
07. Mass Assignment/00. Overview.srt
4.65 KB
07. Mass Assignment/01. Attacking Mass Assignment Vulnerabilities.mp4
4.74 MB
07. Mass Assignment/01. Attacking Mass Assignment Vulnerabilities.srt
4.8 KB
07. Mass Assignment/02. Mass Assignment Defenses.mp4
3.32 MB
07. Mass Assignment/02. Mass Assignment Defenses.srt
3.7 KB
08. Security Misconfiguration/00. Overview.mp4
7.64 MB
08. Security Misconfiguration/00. Overview.srt
8.76 KB
08. Security Misconfiguration/01. Understanding a Vulnerable CORS Implementation.mp4
7.88 MB
08. Security Misconfiguration/01. Understanding a Vulnerable CORS Implementation.srt
8.06 KB
00. Course Overview/00. Course Overview.mp4
3.33 MB
08. Security Misconfiguration/02. Common Security Misconfigurations.srt
10.3 KB
09. Injection/00. Overview.mp4
4.02 MB
09. Injection/00. Overview.srt
4.21 KB
09. Injection/01. Attacking Injection Vulnerabilities.mp4
7.62 MB
09. Injection/01. Attacking Injection Vulnerabilities.srt
7.75 KB
09. Injection/02. Injection Risks.mp4
4.89 MB
09. Injection/02. Injection Risks.srt
4.49 KB
09. Injection/03. Injection Defenses.mp4
9.88 MB
09. Injection/03. Injection Defenses.srt
10.15 KB
10. Improper Assets Management/00. Overview.mp4
4.16 MB
10. Improper Assets Management/00. Overview.srt
4.5 KB
10. Improper Assets Management/01. Attacks on Improper Asset Management.mp4
9.16 MB
10. Improper Assets Management/01. Attacks on Improper Asset Management.srt
7.87 KB
10. Improper Assets Management/02. Defending Your Assets.mp4
5.7 MB
10. Improper Assets Management/02. Defending Your Assets.srt
5.64 KB
11. Insufficient Logging and Monitoring/00. Overview.mp4
4.73 MB
11. Insufficient Logging and Monitoring/00. Overview.srt
5.24 KB
11. Insufficient Logging and Monitoring/01. Effects of Insufficient Logging and Monitoring.mp4
3.44 MB
11. Insufficient Logging and Monitoring/01. Effects of Insufficient Logging and Monitoring.srt
3.17 KB
11. Insufficient Logging and Monitoring/02. Logging and Monitoring for Defense.mp4
4.93 MB
11. Insufficient Logging and Monitoring/02. Logging and Monitoring for Defense.srt
5.38 KB
11. Insufficient Logging and Monitoring/LIFX 1100-Lumen.html
84 B
11. Insufficient Logging and Monitoring/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html
84 B