Section4 - Alternative Web Interfaces.zip
419.5 MB
1 - Introduction
2 - Hash Length Extensions Attacks
3 - Alternative Web Interfaces
4 - Mobile Applications
5 - Compiled Objects
6 - Web Services
7 - WebSockets
8 - HTTP2
2 - Hash Length Extensions Attacks
3 - Alternative Web Interfaces
4 - Mobile Applications
5 - Compiled Objects
6 - Web Services
7 - WebSockets
8 - HTTP2
Section5 - Web Application Firewall and Filter Bypass.zip
287.4 MB
1 - Web Application Security Defenses
2 - Developer Created Defenses
3 - Web Framework Defenses
4 - Inline Security Defenses
5 - Figerprint Defenses
6 - Bypassing XSS Defense
7 - Bypassing SQL Injection Defense
2 - Developer Created Defenses
3 - Web Framework Defenses
4 - Inline Security Defenses
5 - Figerprint Defenses
6 - Bypassing XSS Defense
7 - Bypassing SQL Injection Defense
👍1
1. Linux Hardening.zip
567.6 MB
1 - Intro
2 - Memory Attacks and Overflows
3 - Minimization and Patching
4 - Stopping Boot Services
5 - Session Hijacking and Sniffing
6 - SSH
7 - Host Based Firewalls
8 - WrapUp
2 - Memory Attacks and Overflows
3 - Minimization and Patching
4 - Stopping Boot Services
5 - Session Hijacking and Sniffing
6 - SSH
7 - Host Based Firewalls
8 - WrapUp
2. Linux Hardening.zip
566.6 MB
1 - Rootkits and File Integrity Assessment
2 - Physical Attacks and Defenses
3 - Password Attacks and Access Controls
4 - Sudo
5 - Warning Banners
6 - Kernel Settings for Security
7 - WrapUp
2 - Physical Attacks and Defenses
3 - Password Attacks and Access Controls
4 - Sudo
5 - Warning Banners
6 - Kernel Settings for Security
7 - WrapUp
3. Linux Hardening.zip
735.6 MB
1 - Automated Tasks Via SSH
2 - Unix Logging Overview
3 - SSH Port Forwarding
4 - SyslogNG
5 - Final Remarks
6 - Appendix A Password Alternatives
2 - Unix Logging Overview
3 - SSH Port Forwarding
4 - SyslogNG
5 - Final Remarks
6 - Appendix A Password Alternatives
4. Linux Application Security.zip
962.3 MB
1 - Notes on chroot
2 - SCPOnly Shell
3 - SELinux
2 - SCPOnly Shell
3 - SELinux