04. API Manipulation and Parameter Tampering/05. Response Tampering.mp4 38.53 MB
02. Discovering Device Communication With APIs/05. Discovering More About Mobile Apps via Fiddler.mp4 30.22 MB
03. Leaky APIs and Hidden APIs/02. Discovering Leaky APIs.mp4 29.51 MB
06. Working With SSL Encrypted API Traffic/03. Configuring Fiddler to Decrypt Encrypted Connections.mp4 28.23 MB
04. API Manipulation and Parameter Tampering/04. Manipulating App Logic by Request Tampering.mp4 25.77 MB
04. API Manipulation and Parameter Tampering/03. Modifying Web Traffic in Fiddler.mp4 22.93 MB
hack-your-api-first.zip 22.55 MB
05. API Authentication and Authorization Vulnerabilities/02. Identifying Authentication Persistence.mp4 21.77 MB
05. API Authentication and Authorization Vulnerabilities/04. An Auth Token in Practice.mp4 21.05 MB
05. API Authentication and Authorization Vulnerabilities/09. Testing for Brute Force Protection.mp4 20.45 MB
02. Discovering Device Communication With APIs/03. Interpreting Captured Data in Fiddler.mp4 20.37 MB
03. Leaky APIs and Hidden APIs/07. Securing Hidden APIs.mp4 19.57 MB
03. Leaky APIs and Hidden APIs/04. Discovering Hidden APIs via Documentation Pages.mp4 17.86 MB
05. API Authentication and Authorization Vulnerabilities/07. Circumventing Client Authorization Controls.mp4 17.81 MB
06. Working With SSL Encrypted API Traffic/09. Identifying Invalid Certificates.mp4 17.2 MB
01. Introduction/01. The Age of the API.mp4 15.95 MB
02. Discovering Device Communication With APIs/06. Filtering Traffic in Fiddler.mp4 15.31 MB
03. Leaky APIs and Hidden APIs/03. Securing a Leaky API.mp4 15.1 MB
03. Leaky APIs and Hidden APIs/01. Introduction.mp4 13.88 MB
01. Introduction/05. Introducing Supercar Showdown.mp4 13.51 MB
05. API Authentication and Authorization Vulnerabilities/08. Testing for Insufficient Authorization.mp4 12.68 MB
01. Introduction/06. Introducing the Vulnerable Mobile App.mp4 12.12 MB
05. API Authentication and Authorization Vulnerabilities/03. The Role of Tokens.mp4 11.61 MB
06. Working With SSL Encrypted API Traffic/06. Identifying a Missing Certificate Validation Check.mp4 10.38 MB
05. API Authentication and Authorization Vulnerabilities/06. Identifying Client Controls vs. Server Controls.mp4 10.22 MB
06. Working With SSL Encrypted API Traffic/05. Rejecting Invalid Certificates.mp4 10.12 MB
02. Discovering Device Communication With APIs/02. Proxying Device Traffic Through Fiddler.mp4 9.93 MB
02. Discovering Device Communication With APIs/07. Alternate Traffic Interception Mechanisms.mp4 9.72 MB
03. Leaky APIs and Hidden APIs/06. Discovering Hidden APIs via Google.mp4 9.37 MB
01. Introduction/02. The Hidden Nature of API Security.mp4 8.93 MB
04. API Manipulation and Parameter Tampering/02. Defining Untrusted Data.mp4 8.71 MB
06. Working With SSL Encrypted API Traffic/10. The Value Proposition of Certificate Pinning.mp4 8.58 MB
06. Working With SSL Encrypted API Traffic/01. Introduction.mp4 8.25 MB
06. Working With SSL Encrypted API Traffic/08. SSL Behavior on a Compromised Device.mp4 8.09 MB
05. API Authentication and Authorization Vulnerabilities/05. An Overview of Authorization Controls.mp4 7.78 MB
02. Discovering Device Communication With APIs/01. Who Are We Protecting Our APIs From.mp4 7.65 MB
04. API Manipulation and Parameter Tampering/01. Introduction.mp4 7.51 MB
06. Working With SSL Encrypted API Traffic/11. Demonstrating Certificate Pinning.mp4 7.33 MB
05. API Authentication and Authorization Vulnerabilities/01. Introduction.mp4 7.32 MB
01. Introduction/04. What's the Scope of This Course.mp4 7.32 MB
02. Discovering Device Communication With APIs/04. Intercepting Mobile App Data in Fiddler.mp4 7.2 MB
02. Discovering Device Communication With APIs/08. Summary.mp4 7.15 MB
05. API Authentication and Authorization Vulnerabilities/11. Summary.mp4 7.05 MB
06. Working With SSL Encrypted API Traffic/07. Loading the Fiddler Certificate on a Device.mp4 6.8 MB
06. Working With SSL Encrypted API Traffic/02. MitM'ing an HTTPS Connection With Fiddler.mp4 6.12 MB
04. API Manipulation and Parameter Tampering/06. Summary.mp4 6.09 MB
05. API Authentication and Authorization Vulnerabilities/10. The Role of OpenID Connect and OAuth.mp4 6.06 MB
06. Working With SSL Encrypted API Traffic/12. Summary.mp4 5.76 MB
03. Leaky APIs and Hidden APIs/08. Summary.mp4 5.55 MB
01. Introduction/07. Summary.mp4 4.84 MB
03. Leaky APIs and Hidden APIs/05. Discovering Hidden APIs via robots.txt.mp4 4.79 MB
01. Introduction/03. What Exactly Is an API.mp4 4.63 MB
06. Working With SSL Encrypted API Traffic/04. Proxying Encrypted Device Traffic via Fiddler.mp4 3.93 MB
Download Info
Tips
“Hack Your API First” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.