Magnetic link has been copied to the cutting board

Name [Pluralsight] Hack Your API First Tutorial-KTR

File Type video

Size 664.59MB

UpdateDate 2024-9-9

hash *****63907836321E7666FC5513D8AFD0CB6A13

Hot 14

Files 04 API Manipulation and Parameter Tampering/0405 Response Tampering.mp4 | 38.53MB 02 Discovering Device Communication With APIs/0205 Discovering More About Mobile Apps via Fiddler.mp4 | 30.22MB 03 Leaky APIs and Hidden APIs/0302 Discovering Leaky APIs.mp4 | 29.51MB 06 Working With SSL Encrypted API Traffic/0603 Configuring Fiddler to Decrypt Encrypted Connections.mp4 | 28.23MB 04 API Manipulation and Parameter Tampering/0404 Manipulating App Logic by Request Tampering.mp4 | 25.77MB 04 API Manipulation and Parameter Tampering/0403 Modifying Web Traffic in Fiddler.mp4 | 22.93MB 05 API Authentication and Authorization Vulnerabilities/0502 Identifying Authentication Persistence.mp4 | 21.77MB 05 API Authentication and Authorization Vulnerabilities/0504 An Auth Token in Practice.mp4 | 21.05MB 05 API Authentication and Authorization Vulnerabilities/0509 Testing for Brute Force Protection.mp4 | 20.45MB 02 Discovering Device Communication With APIs/0203 Interpreting Captured Data in Fiddler.mp4 | 20.37MB 03 Leaky APIs and Hidden APIs/0307 Securing Hidden APIs.mp4 | 19.57MB 03 Leaky APIs and Hidden APIs/0304 Discovering Hidden APIs via Documentation Pages.mp4 | 17.86MB 05 API Authentication and Authorization Vulnerabilities/0507 Circumventing Client Authorization Controls.mp4 | 17.81MB 06 Working With SSL Encrypted API Traffic/0609 Identifying Invalid Certificates.mp4 | 17.20MB 01 Introduction/0101 The Age of the API.mp4 | 15.95MB 02 Discovering Device Communication With APIs/0206 Filtering Traffic in Fiddler.mp4 | 15.31MB 03 Leaky APIs and Hidden APIs/0303 Securing a Leaky API.mp4 | 15.10MB 03 Leaky APIs and Hidden APIs/0301 Introduction.mp4 | 13.88MB 01 Introduction/0105 Introducing Supercar Showdown.mp4 | 13.51MB 05 API Authentication and Authorization Vulnerabilities/0508 Testing for Insufficient Authorization.mp4 | 12.68MB 01 Introduction/0106 Introducing the Vulnerable Mobile App.mp4 | 12.12MB 05 API Authentication and Authorization Vulnerabilities/0503 The Role of Tokens.mp4 | 11.61MB 06 Working With SSL Encrypted API Traffic/0606 Identifying a Missing Certificate Validation Check.mp4 | 10.38MB 05 API Authentication and Authorization Vulnerabilities/0506 Identifying Client Controls vs. Server Controls.mp4 | 10.22MB 06 Working With SSL Encrypted API Traffic/0605 Rejecting Invalid Certificates.mp4 | 10.12MB 02 Discovering Device Communication With APIs/0202 Proxying Device Traffic Through Fiddler.mp4 | 9.93MB 02 Discovering Device Communication With APIs/0207 Alternate Traffic Interception Mechanisms.mp4 | 9.72MB 03 Leaky APIs and Hidden APIs/0306 Discovering Hidden APIs via Google.mp4 | 9.37MB 01 Introduction/0102 The Hidden Nature of API Security.mp4 | 8.93MB 04 API Manipulation and Parameter Tampering/0402 Defining Untrusted Data.mp4 | 8.71MB 06 Working With SSL Encrypted API Traffic/0610 The Value Proposition of Certificate Pinning.mp4 | 8.58MB 06 Working With SSL Encrypted API Traffic/0601 Introduction.mp4 | 8.25MB 06 Working With SSL Encrypted API Traffic/0608 SSL Behavior on a Compromised Device.mp4 | 8.09MB 05 API Authentication and Authorization Vulnerabilities/0505 An Overview of Authorization Controls.mp4 | 7.78MB 02 Discovering Device Communication With APIs/0201 Who Are We Protecting Our APIs From.mp4 | 7.65MB 04 API Manipulation and Parameter Tampering/0401 Introduction.mp4 | 7.51MB 06 Working With SSL Encrypted API Traffic/0611 Demonstrating Certificate Pinning.mp4 | 7.33MB 05 API Authentication and Authorization Vulnerabilities/0501 Introduction.mp4 | 7.32MB 01 Introduction/0104 What's the Scope of This Course.mp4 | 7.32MB 02 Discovering Device Communication With APIs/0204 Intercepting Mobile App Data in Fiddler.mp4 | 7.20MB 02 Discovering Device Communication With APIs/0208 Summary.mp4 | 7.15MB 05 API Authentication and Authorization Vulnerabilities/0511 Summary.mp4 | 7.05MB 06 Working With SSL Encrypted API Traffic/0607 Loading the Fiddler Certificate on a Device.mp4 | 6.80MB 06 Working With SSL Encrypted API Traffic/0602 MitM'ing an HTTPS Connection With Fiddler.mp4 | 6.12MB 04 API Manipulation and Parameter Tampering/0406 Summary.mp4 | 6.09MB 05 API Authentication and Authorization Vulnerabilities/0510 The Role of OpenID Connect and OAuth.mp4 | 6.06MB 06 Working With SSL Encrypted API Traffic/0612 Summary.mp4 | 5.76MB 03 Leaky APIs and Hidden APIs/0308 Summary.mp4 | 5.55MB 01 Introduction/0107 Summary.mp4 | 4.84MB 03 Leaky APIs and Hidden APIs/0305 Discovering Hidden APIs via robots.txt.mp4 | 4.79MB 01 Introduction/0103 What Exactly Is an API.mp4 | 4.63MB 06 Working With SSL Encrypted API Traffic/0604 Proxying Encrypted Device Traffic via Fiddler.mp4 | 3.93MB

Recommend

Magnetic link has been copied to the cutting board