OWASP Top 10: API Security Playbook
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size200.3 MB
- Uploaded BySource1337
- Downloads204
- Last checkedMay. 19th '21
- Date uploadedMay. 16th '21
- Seeders 17
- Leechers1
Quote:
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without “Them”, you and we won’t be here having this conversation. Think about it! ☮️ Peace.✌️
Files:
OWASP Top 10- API Security Playbook 08. Security Misconfiguration- 02. Common Security Misconfigurations.mp4 (9.9 MB)
- 00. Overview.mp4 (7.6 MB)
- 00. Overview.srt (8.8 KB)
- 01. Understanding a Vulnerable CORS Implementation.mp4 (7.9 MB)
- 01. Understanding a Vulnerable CORS Implementation.srt (8.1 KB)
- 02. Common Security Misconfigurations.srt (10.3 KB)
- 00. Course Overview.srt (2.3 KB)
- 00. Course Overview.mp4 (3.3 MB)
- 6 Simple Memory Techniques.html (0.1 KB)
- 00. Goals of the API Top 10.mp4 (8.0 MB)
- 00. Goals of the API Top 10.srt (7.8 KB)
- 01. Vulnerability Risk Factors.mp4 (5.7 MB)
- 01. Vulnerability Risk Factors.srt (6.3 KB)
- 00. Overview.mp4 (3.1 MB)
- 00. Overview.srt (3.5 KB)
- 01. Attacking Broken Object Level Authorization.mp4 (7.2 MB)
- 01. Attacking Broken Object Level Authorization.srt (7.9 KB)
- 02. Defending Against Broken Object Level Authorization.mp4 (4.5 MB)
- 02. Defending Against Broken Object Level Authorization.srt (4.8 KB)
- USB Rubber Ducky Deluxe.html (0.1 KB)
- 00. Understanding Broken Authorization.mp4 (7.2 MB)
- 00. Understanding Broken Authorization.srt (7.7 KB)
- 01. Storing Passwords Securely.mp4 (4.4 MB)
- 01. Storing Passwords Securely.srt (5.0 KB)
- 02. Credential Stuffing.mp4 (3.3 MB)
- 02. Credential Stuffing.srt (3.0 KB)
- 03. Common JWT Failures.mp4 (5.2 MB)
- 03. Common JWT Failures.srt (5.5 KB)
- 04. Using API Keys.mp4 (4.6 MB)
- 04. Using API Keys.srt (5.2 KB)
- Yubico - YubiKey 5 NFC.html (0.1 KB)
- 00. Overview.mp4 (5.5 MB)
- 00. Overview.srt (5.7 KB)
- 01. Attacking Excessive Data Exposure.mp4 (4.9 MB)
- 01. Attacking Excessive Data Exposure.srt (5.0 KB)
- 02. Defending Against Excessive Data Exposure.mp4 (3.3 MB)
- 02. Defending Against Excessive Data Exposure.srt (3.8 KB)
- 00. Overview.mp4 (3.8 MB)
- 00. Overview.srt (4.3 KB)
- 01. Attacks on Rate Limiting Vulnerabilities.mp4 (5.7 MB)
- 01. Attacks on Rate Limiting Vulnerabilities.srt (5.7 KB)
- 02. Rate Limiting Risks.mp4 (3.3 MB)
- 02. Rate Limiting Risks.srt (3.3 KB)
- 03. Rate Limiting Defenses.mp4 (6.1 MB)
- 03. Rate Limiting Defenses.srt (5.9 KB)
- 00. Overview.mp4 (3.3 MB)
- 00. Overview.srt (3.3 KB)
- 01. Attacks on Function Level Authorization.mp4 (7.2 MB)
- 01. Attacks on Function Level Authorization.srt (7.4 KB)
- 02. Function Level Authorization Defenses.mp4 (3.9 MB)
- 02. Function Level Authorization Defenses.srt (4.2 KB)
- Linux Tails Operating System.html (0.1 KB)
- 00. Overview.mp4 (4.6 MB)
- 00. Overview.srt (4.7 KB)
- 01. Attacking Mass Assignment Vulnerabilities.mp4 (4.7 MB)
- 01. Attacking Mass Assignment Vulnerabilities.srt (4.8 KB)
- 02. Mass Assignment Defenses.mp4 (3.3 MB)
- 02. Mass Assignment Defenses.srt (3.7 KB)
- 00. Overview.mp4 (4.0 MB)
- 00. Overview.srt (4.2 KB)
- 01. Attacking Injection Vulnerabilities.mp4 (7.6 MB)
- 01. Attacking Injection Vulnerabilities.srt (7.8 KB)
- 02. Injection Risks.mp4 (4.9 MB)
- 02. Injection Risks.srt (4.5 KB)
- 03. Injection Defenses.mp4 (9.9 MB)
- 03. Injection Defenses.srt (10.2 KB)
- 00. Overview.mp4 (4.2 MB)
- 00. Overview.srt (4.5 KB)
- 01. Attacks on Improper Asset Management.mp4 (9.2 MB)
- 01. Attacks on Improper Asset Management.srt (7.9 KB)
- 02. Defending Your Assets.mp4 (5.7 MB)
- 02. Defending Your Assets.srt (5.6 KB)
- 00. Overview.mp4 (4.7 MB)
- 00. Overview.srt (5.2 KB)
- 01. Effects of Insufficient Logging and Monitoring.mp4 (3.4 MB)
- 01. Effects of Insufficient Logging and Monitoring.srt (3.2 KB)
- 02. Logging and Monitoring for Defense.mp4 (4.9 MB)
- 02. Logging and Monitoring for Defense.srt (5.4 KB)
- LIFX 1100-Lumen.html (0.1 KB)
- Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html (0.1 KB)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.moeking.me:6969/announce
- http://tracker-cdn.moeking.me:2095/announce
- udp://wassermann.online:6969/announce
- udp://vibe.community:6969/announce
- udp://valakas.rollo.dnsabr.com:2710/announce
- udp://udp-tracker.shittyurl.org:6969/announce
- udp://tracker1.bt.moack.co.kr:80/announce
- udp://tracker0.ufibox.com:6969/announce
- udp://tracker.zerobytes.xyz:1337/announce
- udp://tracker.zemoj.com:6969/announce
- udp://tracker.v6speed.org:6969/announce
- udp://tracker.uw0.xyz:6969/announce