种子简介
种子名称:
[Pluralsight] Hack Your API First Tutorial-KTR
文件类型:
视频
文件数目:
52个文件
文件大小:
664.59 MB
收录时间:
2017-10-26 13:46
已经下载:
3次
资源热度:
187
最近下载:
2024-11-22 14:13
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:a9ae263907836321e7666fc5513d8afd0cb6a13a&dn=[Pluralsight] Hack Your API First Tutorial-KTR
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[Pluralsight] Hack Your API First Tutorial-KTR.torrent
04 API Manipulation and Parameter Tampering/0405 Response Tampering.mp438.53MB
02 Discovering Device Communication With APIs/0205 Discovering More About Mobile Apps via Fiddler.mp430.22MB
03 Leaky APIs and Hidden APIs/0302 Discovering Leaky APIs.mp429.51MB
06 Working With SSL Encrypted API Traffic/0603 Configuring Fiddler to Decrypt Encrypted Connections.mp428.23MB
04 API Manipulation and Parameter Tampering/0404 Manipulating App Logic by Request Tampering.mp425.77MB
04 API Manipulation and Parameter Tampering/0403 Modifying Web Traffic in Fiddler.mp422.93MB
05 API Authentication and Authorization Vulnerabilities/0502 Identifying Authentication Persistence.mp421.77MB
05 API Authentication and Authorization Vulnerabilities/0504 An Auth Token in Practice.mp421.05MB
05 API Authentication and Authorization Vulnerabilities/0509 Testing for Brute Force Protection.mp420.45MB
02 Discovering Device Communication With APIs/0203 Interpreting Captured Data in Fiddler.mp420.37MB
03 Leaky APIs and Hidden APIs/0307 Securing Hidden APIs.mp419.57MB
03 Leaky APIs and Hidden APIs/0304 Discovering Hidden APIs via Documentation Pages.mp417.86MB
05 API Authentication and Authorization Vulnerabilities/0507 Circumventing Client Authorization Controls.mp417.81MB
06 Working With SSL Encrypted API Traffic/0609 Identifying Invalid Certificates.mp417.2MB
01 Introduction/0101 The Age of the API.mp415.95MB
02 Discovering Device Communication With APIs/0206 Filtering Traffic in Fiddler.mp415.31MB
03 Leaky APIs and Hidden APIs/0303 Securing a Leaky API.mp415.1MB
03 Leaky APIs and Hidden APIs/0301 Introduction.mp413.88MB
01 Introduction/0105 Introducing Supercar Showdown.mp413.51MB
05 API Authentication and Authorization Vulnerabilities/0508 Testing for Insufficient Authorization.mp412.68MB
01 Introduction/0106 Introducing the Vulnerable Mobile App.mp412.12MB
05 API Authentication and Authorization Vulnerabilities/0503 The Role of Tokens.mp411.61MB
06 Working With SSL Encrypted API Traffic/0606 Identifying a Missing Certificate Validation Check.mp410.38MB
05 API Authentication and Authorization Vulnerabilities/0506 Identifying Client Controls vs. Server Controls.mp410.22MB
06 Working With SSL Encrypted API Traffic/0605 Rejecting Invalid Certificates.mp410.12MB
02 Discovering Device Communication With APIs/0202 Proxying Device Traffic Through Fiddler.mp49.93MB
02 Discovering Device Communication With APIs/0207 Alternate Traffic Interception Mechanisms.mp49.72MB
03 Leaky APIs and Hidden APIs/0306 Discovering Hidden APIs via Google.mp49.37MB
01 Introduction/0102 The Hidden Nature of API Security.mp48.93MB
04 API Manipulation and Parameter Tampering/0402 Defining Untrusted Data.mp48.71MB
06 Working With SSL Encrypted API Traffic/0610 The Value Proposition of Certificate Pinning.mp48.58MB
06 Working With SSL Encrypted API Traffic/0601 Introduction.mp48.25MB
06 Working With SSL Encrypted API Traffic/0608 SSL Behavior on a Compromised Device.mp48.09MB
05 API Authentication and Authorization Vulnerabilities/0505 An Overview of Authorization Controls.mp47.78MB
02 Discovering Device Communication With APIs/0201 Who Are We Protecting Our APIs From.mp47.65MB
04 API Manipulation and Parameter Tampering/0401 Introduction.mp47.51MB
06 Working With SSL Encrypted API Traffic/0611 Demonstrating Certificate Pinning.mp47.33MB
05 API Authentication and Authorization Vulnerabilities/0501 Introduction.mp47.32MB
01 Introduction/0104 What's the Scope of This Course.mp47.32MB
02 Discovering Device Communication With APIs/0204 Intercepting Mobile App Data in Fiddler.mp47.2MB
02 Discovering Device Communication With APIs/0208 Summary.mp47.15MB
05 API Authentication and Authorization Vulnerabilities/0511 Summary.mp47.05MB
06 Working With SSL Encrypted API Traffic/0607 Loading the Fiddler Certificate on a Device.mp46.8MB
06 Working With SSL Encrypted API Traffic/0602 MitM'ing an HTTPS Connection With Fiddler.mp46.12MB
04 API Manipulation and Parameter Tampering/0406 Summary.mp46.09MB
05 API Authentication and Authorization Vulnerabilities/0510 The Role of OpenID Connect and OAuth.mp46.06MB
06 Working With SSL Encrypted API Traffic/0612 Summary.mp45.76MB
03 Leaky APIs and Hidden APIs/0308 Summary.mp45.55MB
01 Introduction/0107 Summary.mp44.84MB
03 Leaky APIs and Hidden APIs/0305 Discovering Hidden APIs via robots.txt.mp44.79MB
01 Introduction/0103 What Exactly Is an API.mp44.63MB
06 Working With SSL Encrypted API Traffic/0604 Proxying Encrypted Device Traffic via Fiddler.mp43.93MB