در حال حاضر محصولی در سبد خرید شما وجود ندارد.
Modern web applications are complex and it’s all about full-stack nowadays. That’s why you need to dive into full-stack exploitation if you want to master web attacks. There is no room for classical web application hacking to exploit modern full-stack web apps and therefore, modern-day exploit methods will be showcased here. In this course, it will be shown to you how hackers can bypass Content Security Policy (CSP) which is the most powerful defensive technology in modern web applications. Then during this course, it will also be demonstrated how web applications can be hacked through PDFs, images, and links. You will also learn how hackers can steal secrets from AngularJS applications, which are very popular these days. Before concluding the course, you will understand how to exploit race conditions in web applications and how serious the consequences of this attack can be. At the end of this course, you would have gained knowledge about other powerful, full-stack attacks on modern web applications such as HTTP parameter pollution, subdomain takeover, and clickjacking.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
فیلم یادگیری Web Application Penetration Testing: Weak Cryptography
Case Studies of Award-Winning XSS Attacks: Part 2
Full-Stack Attacks on Modern Web Applications
Credential Access with Hashcat
Credential Access with Hashcat
فیلم یادگیری Web Application Penetration Testing: Input Validation
Web Hacker’s Toolbox – Tools Used by Successful Hackers
فیلم یادگیری Web Application Penetration Testing: Insecure Error Handling
Keep Hacking at HackerOne
Hacking Web Applications via PDFs, Images, and Links