网盘:百度 | 学分:5,VIP免费 | 发布:2023-09-03 | 查看:0 | 更新:2023-09-03 | 测试/产品/安全

Web安全渗透测试

├─第1章 Web 安全渗透测试认知
│&nBSp; &nBSp;&nBSp; &nBSp;1-1课程导学.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;1-图文:1-2 欢迎加入QQ学习交流群【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;1-3迈入Web安全渗透测试的大门.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;1-4谈谈Web安全渗透测试应用发展.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;1-5Web安全渗透测试相关岗位技能要求.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;1-6Web安全渗透测试工作流程.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;1-7网络安全相关法规讲解.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;1-8从一个案例开始Web安全渗透测试.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第2章 Web 安全渗透测试必备基础知识--Web 基础
│&nBSp; &nBSp;&nBSp; &nBSp;2-1Web网络基础.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;2-2HTTP协议与请求.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;2-3常见服务及端口.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;2-4Web架构基础Web集成环境搭建.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;2-5Web前端基础.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;2-6Web后端基础.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;2-7必备数据库基础.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第3章 Web 安全工具环境搭建
│&nBSp; &nBSp;&nBSp; &nBSp;3-1Web安全神器BurPSuite.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;3-2浏览插件HackBar.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;3-3VMWareWorkstation安装使用.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;3-4VMWare虚拟机安装.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;3-5Ubuntu虚拟机安装Docker.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;3-6Web漏洞靶场搭建.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;3-7Web漏洞扫描器AWVS.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;3-8网络扫描工具Nmap.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;3-9Oracle与MSSQL数据漏洞环境搭建.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第4章 Web 权限维持--渗透利器WebShell 后门及管理工具
│&nBSp; &nBSp;&nBSp; &nBSp;4-1初探WebShell.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;4-2隔离环境中跑木马PHPWeb容器.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;4-3由小及大WebShell小马和大马.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;4-4浓缩就是精华一句话木马.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;4-5WebShell工具蚁剑.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;4-6WebShell工具冰蝎.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;4-7WebShell工具哥斯拉.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;4-8作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;4-9作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第5章 Web 后端注入漏洞--基础夯实:SQL 与命令注入漏洞
│&nBSp; &nBSp;&nBSp; &nBSp;5-1揭开SQL注入漏洞的神秘面纱.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-2SQL注入实战回显场景--联合查询型注入.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-3SQL注入实战响应二元组场景--布尔型注入.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-4SQL注入实战无回显场景--时间延迟型注入.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-5SQL注入实战数据库报错回显场景--报错型注入.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-6扩展知识报错型注入原理.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-7SQL注入实战可多语句执行场景--堆叠型注入.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-8SQL注入实战潜在的危害--二次注入.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-9SQL注入实战selectintooutfile写WebShell.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-10SQL注入实战利用日志写WebShell.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-11SQL注入实战MySQLUDF提权.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-12宽字节注入实战转义就一定安全吗.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-13SQL注入神器sqlmap自动化注入.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-14SQL注入实战Oracle数据库场景注入.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-15SQL注入实战Oracle提权利用.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-16SQL注入实战MSSQL数据库场景注入.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-17SQL注入实战MSSQL提权利用.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-18SQL注入漏洞防御之.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-19漏洞老大命令注入漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-20命令注入实战绕过无回显场景的攻击利用.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-21命令注入漏洞防御之.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;5-22 作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;5-23 作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第6章 Web 后端注入漏洞--进阶提升:10 大经典注入漏洞
│&nBSp; &nBSp;&nBSp; &nBSp;6-1命令注入的兄弟代码注入漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;6-2表达也能翻天表达式注入漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;6-3参数可控也危险参数注入漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;6-4从核弹级漏洞Log4Shell看JNDI注入漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;6-5碰碰运气SSI注入漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;6-6模板也不安全SSTI漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;6-7回车也能攻击CRLF注入漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;6-8SQL注入的孪生兄弟NoSQL注入漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;6-10SQL注入的猪朋狗友XPath注入漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;6-11XXEXML外部实体注入漏洞原理实战一.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;6-12XXEXML外部实体注入漏洞原理实战二.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;6-13 作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;6-14 作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第7章 Web 后端漏洞--内功修炼:反序列化漏洞
│&nBSp; &nBSp;&nBSp; &nBSp;7-1初探反序列化漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;7-3面试必考ApacheCommonsCollections反序列化漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;7-4反序列化利用工具ysoserial简介使用mp4_音频.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;7-5渗透TOP漏洞Fastjson反序列化漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;7-6CTF比赛常见PHP序列化漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;7-7python也搞事情python序列化漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;7-8鸡肋也要学NodeJS反序列化漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;7-8鸡肋也要学NodeJS反序列化漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;7-9 作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;7-10 作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第8章 Web 后端漏洞--内功修炼文件操作类漏洞
│&nBSp; &nBSp;&nBSp; &nBSp;8-1初探文件操作类漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;8-2文件上传漏洞原理实战图片文件上传场景攻击.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;8-3文件上传实战绕过前端检测.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;8-4文件上传实战绕过MIME类型检测.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;8-5文件上传实战绕过文件扩展名检测.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;8-6文件上传实战绕过文件内容检测.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;8-7文件上传实战PUT方法场景文件上传实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;8-8目录穿越任意文件读漏洞原理实战穿越目录读取非预期敏感文件.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;8-9文件包含漏洞原理实战绕过文件上传后缀限制实现代码执行.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;8-10啥都能下载任意文件下载漏洞原理实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;8-11 作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;8-12 作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第9章 Web 后端漏洞--视野拓展:10+ 通用漏洞
│&nBSp; &nBSp;&nBSp; &nBSp;9-1SSRF原理实战攻击内网Redis实现getshell.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;9-2任意URL跳转漏洞原理实战修改跳转URL到钓鱼站点.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;9-3敏感信息泄露漏洞原理实战Web前端账号信息泄露.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;9-4暴力破解攻击原理实战暴破登录Web后台.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;9-5DoS拒绝服务攻击原理实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;9-6未授权访问漏洞原理实战通过授权访问Web管理页面实现getshell.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;9-7变量覆盖漏洞原理实战GLOBALS全局变量覆盖导致代码执行.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;9-8弱类型漏洞原理实战MD5哈希碰撞攻击.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;9-9Web缓存投毒攻击原理实战利用缓存恶意响应攻击其他用户.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;9-10HRS漏洞原理实战利用后端解析二义性绕过检测.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;9-11 讨论题【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第10章 Web 后端漏洞--业务逻辑漏洞
│&nBSp; &nBSp;&nBSp; &nBSp;10-1业务逻辑漏洞初探.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;10-2认证绕过漏洞原理实战身份认证场景绕过.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;10-3验证逻辑漏洞原理实战跳过验证码校验阶段绕过.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;10-4越权漏洞原理实战越权修改其他用户密码添加账号.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;10-5支付漏洞实战篡改商品价格数据.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;10-6邮箱轰炸攻击原理实战打爆满的邮箱.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;10-7 作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第11章 Web 前端漏洞原理实战
│&nBSp; &nBSp;&nBSp; &nBSp;11-1XSS跨站脚本漏洞原理常见注入标签.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-2反射型XSS漏洞原理实战需要循循善诱的攻击利用.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-3前端攻击花样XSS漏洞常见利用方式.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-4BeEFXSS渗透攻击框架.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-5存储型XSS漏洞原理实战来自保存在服务端的XSS攻击.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-6DOM型XSS漏洞原理实战不经过Web后端处理的纯前端攻击.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-7XSS漏洞实战场景之Ajax请求.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-8XSS漏洞实战场景之HeADer头注入点.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-9XSS漏洞实战场景之JS字符串注入点.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-10XSS漏洞实战场景之a标签href属性注入点.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-11XSS漏洞实战场景之XML报文注入点.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-12XSS漏洞防御之从一些XSS绕过案例如何正确防御XSS.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-13CSP内容安全策略简介与绕过实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-14CSRF跨站请求伪造漏洞原理.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-15CSRF实战诱使用户触发密码修改.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-16CSRF漏洞防御绕过之Referer头检测.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-17CSRF漏洞防御之.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-18前端漏洞组合拳之XSS与CSRF通过XSS窃取Anti-CSRFToken进行CSRF攻击.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-19不容小视的ClickJacking点击劫持漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-20JavaScrIPt攻击token客户生成绕过.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-21JavaScrIPt原型链污染漏洞原理浅析.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-22JavaScrIPt原型链污染漏洞原理浅析.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-23JavaScrIPt原型链污染漏洞实战从变量污染到RCE.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;11-24 作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第12章 Web 跨域漏洞攻防实战
│&nBSp; &nBSp;&nBSp; &nBSp;12-1初探Web跨域.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;12-2Web跨域实战JSONP跨域漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;12-3Web跨域实战CORS跨域漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;12-4Web跨域实战postMessage跨域漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;12-5XSSI跨域脚本包含漏洞原理与攻防实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第13章 WebSocket 漏洞安全攻防
│&nBSp; &nBSp;&nBSp; &nBSp;13-1浅谈WebSocket安全.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;13-2CSWSH跨站点WebSocket劫持漏洞.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;13-3在线聊天弹框XSS攻击WebSocket.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;13-4可用性攻击DoS攻击WebSocket.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第14章 WebService渗透测试
│&nBSp; &nBSp;&nBSp; &nBSp;14-1初探WebService.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;14-2方法WebService渗透测试方法.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;14-3编写WebService漏洞靶场及渗透实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第15章 6 大中间件漏洞原理实战
│&nBSp; &nBSp;&nBSp; &nBSp;15-1Nginx解析漏洞原理与攻防实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;15-2Apachehttpd换行解析漏洞原理与攻防实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;15-3Tomcat从弱口令到getshell攻防实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;15-4WebLogic任意文件上传漏洞原理与攻防实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;15-5Jboss反序列化漏洞原理与攻防实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;15-6PHP-FPM未授权访问原理与攻防实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第16章 4 类数据库服务漏洞原理实战
│&nBSp; &nBSp;&nBSp; &nBSp;16-1利用主从复制攻击未授权Redis.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;16-2MySQL身份认证绕过漏洞原理与攻防实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;16-3InfluxDB未授权访问漏洞原理与攻防实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;16-4PostgreSQL高权限命令执行漏洞原理与攻防实战.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;
├─第17章 【拓展拔高】内存马--无文件 WebShell 后门技术
│&nBSp; &nBSp;&nBSp; &nBSp;17-1揭秘文件WebShell内存马.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;17-2无文件WebShell一Java内存马.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;17-3无文件WebShell二python内存马.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;17-4无文件WebShell三PHP内存马.mp4
│&nBSp; &nBSp;&nBSp; &nBSp;17-5 作业【缺】
│&nBSp; &nBSp;&nBSp; &nBSp;
└─第18章 课程总结
&nBSp; &nBSp;&nBSp; &nBSp; 18-1课程总结.mp4


作业资料视频齐全



*声明:课程资源购自网络,版权归原作者所有,仅供参考学习使用,严禁外传及商用,若侵犯到您的权益请联系客服删除。

下载地址(复制到浏览器打开,手机端请扫码下载):

请登录购买后查看,VIP全站免费下载

充值 升级VIP
收藏(0

万部精品课程任意搜

热门TAG: 238页 场景 要看 班鲁 新手轻 学会 握手 3580G 艾灸全书 中国
微信客服 搜索课程 返回顶部