本站已收录 番号和无损神作磁力链接/BT种子 

[Pluralsight] Hack Your API First Tutorial-KTR

种子简介

种子名称: [Pluralsight] Hack Your API First Tutorial-KTR
文件类型: 视频
文件数目: 52个文件
文件大小: 664.59 MB
收录时间: 2017-10-26 13:46
已经下载: 3
资源热度: 175
最近下载: 2024-9-29 02:01

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:a9ae263907836321e7666fc5513d8afd0cb6a13a&dn=[Pluralsight] Hack Your API First Tutorial-KTR 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[Pluralsight] Hack Your API First Tutorial-KTR.torrent
  • 04 API Manipulation and Parameter Tampering/0405 Response Tampering.mp438.53MB
  • 02 Discovering Device Communication With APIs/0205 Discovering More About Mobile Apps via Fiddler.mp430.22MB
  • 03 Leaky APIs and Hidden APIs/0302 Discovering Leaky APIs.mp429.51MB
  • 06 Working With SSL Encrypted API Traffic/0603 Configuring Fiddler to Decrypt Encrypted Connections.mp428.23MB
  • 04 API Manipulation and Parameter Tampering/0404 Manipulating App Logic by Request Tampering.mp425.77MB
  • 04 API Manipulation and Parameter Tampering/0403 Modifying Web Traffic in Fiddler.mp422.93MB
  • 05 API Authentication and Authorization Vulnerabilities/0502 Identifying Authentication Persistence.mp421.77MB
  • 05 API Authentication and Authorization Vulnerabilities/0504 An Auth Token in Practice.mp421.05MB
  • 05 API Authentication and Authorization Vulnerabilities/0509 Testing for Brute Force Protection.mp420.45MB
  • 02 Discovering Device Communication With APIs/0203 Interpreting Captured Data in Fiddler.mp420.37MB
  • 03 Leaky APIs and Hidden APIs/0307 Securing Hidden APIs.mp419.57MB
  • 03 Leaky APIs and Hidden APIs/0304 Discovering Hidden APIs via Documentation Pages.mp417.86MB
  • 05 API Authentication and Authorization Vulnerabilities/0507 Circumventing Client Authorization Controls.mp417.81MB
  • 06 Working With SSL Encrypted API Traffic/0609 Identifying Invalid Certificates.mp417.2MB
  • 01 Introduction/0101 The Age of the API.mp415.95MB
  • 02 Discovering Device Communication With APIs/0206 Filtering Traffic in Fiddler.mp415.31MB
  • 03 Leaky APIs and Hidden APIs/0303 Securing a Leaky API.mp415.1MB
  • 03 Leaky APIs and Hidden APIs/0301 Introduction.mp413.88MB
  • 01 Introduction/0105 Introducing Supercar Showdown.mp413.51MB
  • 05 API Authentication and Authorization Vulnerabilities/0508 Testing for Insufficient Authorization.mp412.68MB
  • 01 Introduction/0106 Introducing the Vulnerable Mobile App.mp412.12MB
  • 05 API Authentication and Authorization Vulnerabilities/0503 The Role of Tokens.mp411.61MB
  • 06 Working With SSL Encrypted API Traffic/0606 Identifying a Missing Certificate Validation Check.mp410.38MB
  • 05 API Authentication and Authorization Vulnerabilities/0506 Identifying Client Controls vs. Server Controls.mp410.22MB
  • 06 Working With SSL Encrypted API Traffic/0605 Rejecting Invalid Certificates.mp410.12MB
  • 02 Discovering Device Communication With APIs/0202 Proxying Device Traffic Through Fiddler.mp49.93MB
  • 02 Discovering Device Communication With APIs/0207 Alternate Traffic Interception Mechanisms.mp49.72MB
  • 03 Leaky APIs and Hidden APIs/0306 Discovering Hidden APIs via Google.mp49.37MB
  • 01 Introduction/0102 The Hidden Nature of API Security.mp48.93MB
  • 04 API Manipulation and Parameter Tampering/0402 Defining Untrusted Data.mp48.71MB
  • 06 Working With SSL Encrypted API Traffic/0610 The Value Proposition of Certificate Pinning.mp48.58MB
  • 06 Working With SSL Encrypted API Traffic/0601 Introduction.mp48.25MB
  • 06 Working With SSL Encrypted API Traffic/0608 SSL Behavior on a Compromised Device.mp48.09MB
  • 05 API Authentication and Authorization Vulnerabilities/0505 An Overview of Authorization Controls.mp47.78MB
  • 02 Discovering Device Communication With APIs/0201 Who Are We Protecting Our APIs From.mp47.65MB
  • 04 API Manipulation and Parameter Tampering/0401 Introduction.mp47.51MB
  • 06 Working With SSL Encrypted API Traffic/0611 Demonstrating Certificate Pinning.mp47.33MB
  • 05 API Authentication and Authorization Vulnerabilities/0501 Introduction.mp47.32MB
  • 01 Introduction/0104 What's the Scope of This Course.mp47.32MB
  • 02 Discovering Device Communication With APIs/0204 Intercepting Mobile App Data in Fiddler.mp47.2MB
  • 02 Discovering Device Communication With APIs/0208 Summary.mp47.15MB
  • 05 API Authentication and Authorization Vulnerabilities/0511 Summary.mp47.05MB
  • 06 Working With SSL Encrypted API Traffic/0607 Loading the Fiddler Certificate on a Device.mp46.8MB
  • 06 Working With SSL Encrypted API Traffic/0602 MitM'ing an HTTPS Connection With Fiddler.mp46.12MB
  • 04 API Manipulation and Parameter Tampering/0406 Summary.mp46.09MB
  • 05 API Authentication and Authorization Vulnerabilities/0510 The Role of OpenID Connect and OAuth.mp46.06MB
  • 06 Working With SSL Encrypted API Traffic/0612 Summary.mp45.76MB
  • 03 Leaky APIs and Hidden APIs/0308 Summary.mp45.55MB
  • 01 Introduction/0107 Summary.mp44.84MB
  • 03 Leaky APIs and Hidden APIs/0305 Discovering Hidden APIs via robots.txt.mp44.79MB
  • 01 Introduction/0103 What Exactly Is an API.mp44.63MB
  • 06 Working With SSL Encrypted API Traffic/0604 Proxying Encrypted Device Traffic via Fiddler.mp43.93MB