OWASP Top 10 Web Application Security Risks for ASP.NET


File Information

File Size:   2.14 GB
Creat Time:   2016-01-31
Active Degree:   162
Last Active:   2024-11-18
Magnet Link:    Magnet LinkMagnet Link
Statement:   This site does not provide download links, only text displays, and does not contain any infringement.

File List

  1. Exercide Files.zip 369.61 MB
  2. 3. Cross Site Scripting (XSS)/11 - Demo - ASP NET reequest validation.mp4 65.17 MB
  3. 8. Insecure Cryptographic Storage/3 - Demo - Anatomy of an attack.mp4 61.50 MB
  4. 5. Insecure Direct Object References/8 - Demo - Building an indirect reference map.mp4 43.87 MB
  5. 7. Security Misconfiguration/5 - Demo - Correctly configuring custom errors.mp4 40.58 MB
  6. 10. Insufficient Transport Layer Protection/3 - Demo - Anatomy of an attackmp4.mp4 39.65 MB
  7. 10. Insufficient Transport Layer Protection/5 - Demo - Understanding secure cookies and froms authentication.mp4 38.38 MB
  8. 10. Insufficient Transport Layer Protection/6 - Demo - Securing other cookies in ASP NET.mp4 37.32 MB
  9. 2. Injection/3 - Demo - Anatomy of an attack.mp4 36.27 MB
  10. 8. Insecure Cryptographic Storage/6 - Understanding salt and brute force attacks.mp4 34.91 MB
  11. 6. Cross Site Request Forgery (CSRF)/5 - What make a CSRF attack possible.mp4 34.02 MB
  12. 7. Security Misconfiguration/9 - Demo - Using config transforms to apply secure configurations.mp4 33.38 MB
  13. 9. Failure to Restrict URL Access/7 - Demo - Role based authorisation with the ASP NET Role Provider.mp4 29.93 MB
  14. 10. Insufficient Transport Layer Protection/4 - Risk in practice - Tunisian ISPs.mp4 29.50 MB
  15. 7. Security Misconfiguration/8 - Demo - Encrypting sensitive parts of the web-config.mp4 29.47 MB
  16. 8. Insecure Cryptographic Storage/7 - Slowing down hashes with new Membership Provider.mp4 27.15 MB
  17. 7. Security Misconfiguration/3 - Demo - Anatomy of an attack.mp4 26.51 MB
  18. 3. Cross Site Scripting (XSS)/7 - Demo - Implementing output encoding.mp4 26.17 MB
  19. 8. Insecure Cryptographic Storage/5 - Understanding password storage and hashing.mp4 25.70 MB
  20. 2. Injection/12 - Demo - Injection through stored procedures.mp4 25.23 MB
  21. 3. Cross Site Scripting (XSS)/4 - Risk in practice - My Space and Samy.mp4 25.14 MB
  22. 8. Insecure Cryptographic Storage/11 - Demo - Symmetric encryption using DPAPI.mp4 24.05 MB
  23. 7. Security Misconfiguration/7 - Demo - Keeping frameworks currrent with NuGet.mp4 22.71 MB
  24. 10. Insufficient Transport Layer Protection/9 - Demo - Mixed mode HTTPS.mp4 21.63 MB
  25. 9. Failure to Restrict URL Access/4 - Risk in practice - Apple AT&T leak.mp4 21.62 MB
  26. 9. Failure to Restrict URL Access/6 - Demo - Access controls in ASP NET part 2 - The authorize attribute.mp4 21.60 MB
  27. 7. Security Misconfiguration/6 - Demo - Securing web forms tracing.mp4 21.33 MB
  28. 5. Insecure Direct Object References/6 - Demo - Implementing access controls.mp4 20.48 MB
  29. 9. Failure to Restrict URL Access/5 - Demo - Access controls in ASP NET part 1 - web-config locations.mp4 20.08 MB
  30. 2. Injection/10 - Demo - Whitelisting untrusted data.mp4 20.03 MB
  31. 10. Insufficient Transport Layer Protection/7 - Demo - Forcing web forms to use HTTPS.mp4 19.98 MB
  32. 11. Unvalidated Redirects and Forwards/3 - Demo - Anatomy of an attack.mp4 19.23 MB
  33. 6. Cross Site Request Forgery (CSRF)/7 - Demo - Implementing an anti-frogery token in MVC.mp4 18.91 MB
  34. 11. Unvalidated Redirects and Forwards/7 - Demo - implementing referrer checking.mp4 18.86 MB
  35. 9. Failure to Restrict URL Access/8 - Other access controls risk and misconceptions.mp4 18.85 MB
  36. 8. Insecure Cryptographic Storage/4 - Risk in practice - ABC passwords.mp4 18.43 MB
  37. 2. Injection/13 - Demo - Injection automation with Havij.mp4 18.35 MB
  38. 2. Injection/7 - Demo - The principle of least privilege.mp4 18.18 MB
  39. 6. Cross Site Request Forgery (CSRF)/8 - Demo - Web forms approach to anti-frogery tokens.mp4 17.91 MB
  40. 3. Cross Site Scripting (XSS)/12 - Demo - Reflective versus persistent XSS.mp4 17.85 MB
  41. 6. Cross Site Request Forgery (CSRF)/4 - Risk in practice - Compromised Brazillian modems.mp4 17.83 MB
  42. 4. Broken Authentication and Session Management/8 - Demo - Leveraging ASP NET membership provider for authentication.mp4 17.82 MB
  43. 7. Security Misconfiguration/4 - Risk in practice - ELMAH.mp4 17.47 MB
  44. 11. Unvalidated Redirects and Forwards/6 - Demo - implementing a whitelist.mp4 17.14 MB
  45. 3. Cross Site Scripting (XSS)/3 - Demo - Anatomy of an attacker.mp4 17.14 MB
  46. 10. Insufficient Transport Layer Protection/12 - Other HTTPS considerations.mp4 17.08 MB
  47. 5. Insecure Direct Object References/3 - Demo - Anatomy of an attack.mp4 16.91 MB
  48. 10. Insufficient Transport Layer Protection/11 - Other insufficient HTTPS patterns.mp4 16.77 MB
  49. 2. Injection/11 - Demo - Entity Framework's SQL parameterisation.mp4 16.50 MB
  50. 2. Injection/8 - Demo - Inline SQL parameterisation.mp4 15.95 MB