TorBT - Torrents and Magnet Links Search Engine
[Pluralsight] Hack Your API First Tutorial-KTR
- Date: 2024-12-07
- Size: 665 MB
- Files: 52
File Name
Size
04 API Manipulation and Parameter Tampering/0405 Response Tampering.mp4
38 MB
02 Discovering Device Communication With APIs/0205 Discovering More About Mobile Apps via Fiddler.mp4
30 MB
03 Leaky APIs and Hidden APIs/0302 Discovering Leaky APIs.mp4
30 MB
06 Working With SSL Encrypted API Traffic/0603 Configuring Fiddler to Decrypt Encrypted Connections.mp4
28 MB
04 API Manipulation and Parameter Tampering/0404 Manipulating App Logic by Request Tampering.mp4
26 MB
04 API Manipulation and Parameter Tampering/0403 Modifying Web Traffic in Fiddler.mp4
23 MB
05 API Authentication and Authorization Vulnerabilities/0502 Identifying Authentication Persistence.mp4
22 MB
05 API Authentication and Authorization Vulnerabilities/0504 An Auth Token in Practice.mp4
21 MB
05 API Authentication and Authorization Vulnerabilities/0509 Testing for Brute Force Protection.mp4
20 MB
02 Discovering Device Communication With APIs/0203 Interpreting Captured Data in Fiddler.mp4
20 MB
03 Leaky APIs and Hidden APIs/0307 Securing Hidden APIs.mp4
20 MB
03 Leaky APIs and Hidden APIs/0304 Discovering Hidden APIs via Documentation Pages.mp4
18 MB
05 API Authentication and Authorization Vulnerabilities/0507 Circumventing Client Authorization Controls.mp4
18 MB
06 Working With SSL Encrypted API Traffic/0609 Identifying Invalid Certificates.mp4
17 MB
01 Introduction/0101 The Age of the API.mp4
16 MB
02 Discovering Device Communication With APIs/0206 Filtering Traffic in Fiddler.mp4
15 MB
03 Leaky APIs and Hidden APIs/0303 Securing a Leaky API.mp4
15 MB
03 Leaky APIs and Hidden APIs/0301 Introduction.mp4
14 MB
01 Introduction/0105 Introducing Supercar Showdown.mp4
14 MB
05 API Authentication and Authorization Vulnerabilities/0508 Testing for Insufficient Authorization.mp4
13 MB
01 Introduction/0106 Introducing the Vulnerable Mobile App.mp4
12 MB
05 API Authentication and Authorization Vulnerabilities/0503 The Role of Tokens.mp4
12 MB
06 Working With SSL Encrypted API Traffic/0606 Identifying a Missing Certificate Validation Check.mp4
10 MB
05 API Authentication and Authorization Vulnerabilities/0506 Identifying Client Controls vs. Server Controls.mp4
10 MB
06 Working With SSL Encrypted API Traffic/0605 Rejecting Invalid Certificates.mp4
10 MB
02 Discovering Device Communication With APIs/0202 Proxying Device Traffic Through Fiddler.mp4
9.9 MB
02 Discovering Device Communication With APIs/0207 Alternate Traffic Interception Mechanisms.mp4
9.7 MB
03 Leaky APIs and Hidden APIs/0306 Discovering Hidden APIs via Google.mp4
9.4 MB
01 Introduction/0102 The Hidden Nature of API Security.mp4
8.9 MB
04 API Manipulation and Parameter Tampering/0402 Defining Untrusted Data.mp4
8.7 MB
06 Working With SSL Encrypted API Traffic/0610 The Value Proposition of Certificate Pinning.mp4
8.6 MB
06 Working With SSL Encrypted API Traffic/0601 Introduction.mp4
8.2 MB
06 Working With SSL Encrypted API Traffic/0608 SSL Behavior on a Compromised Device.mp4
8.1 MB
05 API Authentication and Authorization Vulnerabilities/0505 An Overview of Authorization Controls.mp4
7.8 MB
02 Discovering Device Communication With APIs/0201 Who Are We Protecting Our APIs From.mp4
7.6 MB
04 API Manipulation and Parameter Tampering/0401 Introduction.mp4
7.5 MB
06 Working With SSL Encrypted API Traffic/0611 Demonstrating Certificate Pinning.mp4
7.3 MB
05 API Authentication and Authorization Vulnerabilities/0501 Introduction.mp4
7.3 MB
01 Introduction/0104 What's the Scope of This Course.mp4
7.3 MB
02 Discovering Device Communication With APIs/0204 Intercepting Mobile App Data in Fiddler.mp4
7.2 MB
02 Discovering Device Communication With APIs/0208 Summary.mp4
7.1 MB
05 API Authentication and Authorization Vulnerabilities/0511 Summary.mp4
7.1 MB
06 Working With SSL Encrypted API Traffic/0607 Loading the Fiddler Certificate on a Device.mp4
6.8 MB
06 Working With SSL Encrypted API Traffic/0602 MitM'ing an HTTPS Connection With Fiddler.mp4
6.1 MB
04 API Manipulation and Parameter Tampering/0406 Summary.mp4
6.1 MB
05 API Authentication and Authorization Vulnerabilities/0510 The Role of OpenID Connect and OAuth.mp4
6.1 MB
06 Working With SSL Encrypted API Traffic/0612 Summary.mp4
5.8 MB
03 Leaky APIs and Hidden APIs/0308 Summary.mp4
5.5 MB
01 Introduction/0107 Summary.mp4
4.8 MB
03 Leaky APIs and Hidden APIs/0305 Discovering Hidden APIs via robots.txt.mp4
4.8 MB
01 Introduction/0103 What Exactly Is an API.mp4
4.6 MB
06 Working With SSL Encrypted API Traffic/0604 Proxying Encrypted Device Traffic via Fiddler.mp4
3.9 MB