搜索
Hack Your API First
磁力链接/BT种子名称
Hack Your API First
磁力链接/BT种子简介
种子哈希:
43070484153f57ba65424d355f58e1c59cf9fe93
文件大小:
687.14M
已经下载:
3269
次
下载速度:
极快
收录时间:
2017-02-15
最近下载:
2025-10-30
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:43070484153F57BA65424D355F58E1C59CF9FE93
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
小蓝俱乐部
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
51动漫
91短视频
抖音Max
TikTok成人版
PornHub
暗网Xvideo
草榴社区
哆哔涩漫
呦乐园
萝莉岛
搜同
最近搜索
三女
cameron.dee
韩舞bj
有多爽
billboard hot 100 singles chart
白色虎
韩国bj 裸舞
shijiu十九
tchb-022
年年 上海花
lqqq-032 c
女良
連褲襪
mkck-252
lori
2024年1月
内衣+诱惑
骚肥
deeper.
4k 高潮
麻豆+新年
tchb-033
尿
stop stop stop
油光
开房干哭
巨乳 白
怪ayakasi
hotel系列
露脸直播赚外快
文件列表
04. API Manipulation and Parameter Tampering/05. Response Tampering.mp4
40.4 MB
02. Discovering Device Communication With APIs/05. Discovering More About Mobile Apps via Fiddler.mp4
31.7 MB
03. Leaky APIs and Hidden APIs/02. Discovering Leaky APIs.mp4
30.9 MB
06. Working With SSL Encrypted API Traffic/03. Configuring Fiddler to Decrypt Encrypted Connections.mp4
29.6 MB
04. API Manipulation and Parameter Tampering/04. Manipulating App Logic by Request Tampering.mp4
27.0 MB
04. API Manipulation and Parameter Tampering/03. Modifying Web Traffic in Fiddler.mp4
24.0 MB
hack-your-api-first.zip
23.6 MB
05. API Authentication and Authorization Vulnerabilities/02. Identifying Authentication Persistence.mp4
22.8 MB
05. API Authentication and Authorization Vulnerabilities/04. An Auth Token in Practice.mp4
22.1 MB
05. API Authentication and Authorization Vulnerabilities/09. Testing for Brute Force Protection.mp4
21.4 MB
02. Discovering Device Communication With APIs/03. Interpreting Captured Data in Fiddler.mp4
21.4 MB
03. Leaky APIs and Hidden APIs/07. Securing Hidden APIs.mp4
20.5 MB
03. Leaky APIs and Hidden APIs/04. Discovering Hidden APIs via Documentation Pages.mp4
18.7 MB
05. API Authentication and Authorization Vulnerabilities/07. Circumventing Client Authorization Controls.mp4
18.7 MB
06. Working With SSL Encrypted API Traffic/09. Identifying Invalid Certificates.mp4
18.0 MB
01. Introduction/01. The Age of the API.mp4
16.7 MB
02. Discovering Device Communication With APIs/06. Filtering Traffic in Fiddler.mp4
16.0 MB
03. Leaky APIs and Hidden APIs/03. Securing a Leaky API.mp4
15.8 MB
03. Leaky APIs and Hidden APIs/01. Introduction.mp4
14.6 MB
01. Introduction/05. Introducing Supercar Showdown.mp4
14.2 MB
05. API Authentication and Authorization Vulnerabilities/08. Testing for Insufficient Authorization.mp4
13.3 MB
01. Introduction/06. Introducing the Vulnerable Mobile App.mp4
12.7 MB
05. API Authentication and Authorization Vulnerabilities/03. The Role of Tokens.mp4
12.2 MB
06. Working With SSL Encrypted API Traffic/06. Identifying a Missing Certificate Validation Check.mp4
10.9 MB
05. API Authentication and Authorization Vulnerabilities/06. Identifying Client Controls vs. Server Controls.mp4
10.7 MB
06. Working With SSL Encrypted API Traffic/05. Rejecting Invalid Certificates.mp4
10.6 MB
02. Discovering Device Communication With APIs/02. Proxying Device Traffic Through Fiddler.mp4
10.4 MB
02. Discovering Device Communication With APIs/07. Alternate Traffic Interception Mechanisms.mp4
10.2 MB
03. Leaky APIs and Hidden APIs/06. Discovering Hidden APIs via Google.mp4
9.8 MB
01. Introduction/02. The Hidden Nature of API Security.mp4
9.4 MB
04. API Manipulation and Parameter Tampering/02. Defining Untrusted Data.mp4
9.1 MB
06. Working With SSL Encrypted API Traffic/10. The Value Proposition of Certificate Pinning.mp4
9.0 MB
06. Working With SSL Encrypted API Traffic/01. Introduction.mp4
8.6 MB
06. Working With SSL Encrypted API Traffic/08. SSL Behavior on a Compromised Device.mp4
8.5 MB
05. API Authentication and Authorization Vulnerabilities/05. An Overview of Authorization Controls.mp4
8.2 MB
02. Discovering Device Communication With APIs/01. Who Are We Protecting Our APIs From.mp4
8.0 MB
04. API Manipulation and Parameter Tampering/01. Introduction.mp4
7.9 MB
06. Working With SSL Encrypted API Traffic/11. Demonstrating Certificate Pinning.mp4
7.7 MB
05. API Authentication and Authorization Vulnerabilities/01. Introduction.mp4
7.7 MB
01. Introduction/04. What's the Scope of This Course.mp4
7.7 MB
02. Discovering Device Communication With APIs/04. Intercepting Mobile App Data in Fiddler.mp4
7.6 MB
02. Discovering Device Communication With APIs/08. Summary.mp4
7.5 MB
05. API Authentication and Authorization Vulnerabilities/11. Summary.mp4
7.4 MB
06. Working With SSL Encrypted API Traffic/07. Loading the Fiddler Certificate on a Device.mp4
7.1 MB
06. Working With SSL Encrypted API Traffic/02. MitM'ing an HTTPS Connection With Fiddler.mp4
6.4 MB
04. API Manipulation and Parameter Tampering/06. Summary.mp4
6.4 MB
05. API Authentication and Authorization Vulnerabilities/10. The Role of OpenID Connect and OAuth.mp4
6.4 MB
06. Working With SSL Encrypted API Traffic/12. Summary.mp4
6.0 MB
03. Leaky APIs and Hidden APIs/08. Summary.mp4
5.8 MB
01. Introduction/07. Summary.mp4
5.1 MB
03. Leaky APIs and Hidden APIs/05. Discovering Hidden APIs via robots.txt.mp4
5.0 MB
01. Introduction/03. What Exactly Is an API.mp4
4.9 MB
06. Working With SSL Encrypted API Traffic/04. Proxying Encrypted Device Traffic via Fiddler.mp4
4.1 MB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!