وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Breaking APIs: An Offensive API Pentesting Course

سرفصل های دوره

Offensive API Pentesting: Identify Vulnerabilities, Attack Weaknesses, and Enhance Defenses With Offensive Pentesting.


1 - Introduction
  • 1 - Introduction
  • 2 - API-Pentesting-Mindmap-ATTACK.pdf
  • 2 - API-Pentesting-Mindmap-HTML.html
  • 2 - Breaking-APIs-An-Offensive-API-Pentesting-Course.pdf
  • 2 - Introduction to APIs
  • 2 - What is an API.txt
  • 3 - What are REST APIs
  • 3 - What is a REST API.txt
  • 4 - Web Application Fundamentals
  • 5 - Statefull and Stateless HTTP Reqests
  • 5 - Stateful vs stateless.txt
  • 6 - Types of APIs
  • 7 - API Authentication Process

  • 2 - What Is API Pentesting
  • 8 - What Is API Pentesting

  • 3 - Lab Setup
  • 9 - Lab Setup and Lab Overview

  • 4 - Tools Setup
  • 10 - Burpsuite Configurations
  • 10 - Portswigger Website.txt
  • 11 - Postman Dowload and Setup
  • 11 - Postman Download.txt
  • 12 - Postman Introduction

  • 5 - Active and Passive Recon
  • 13 - Introduction Of Active and Passive Recon
  • 14 - Active Recon
  • 15 - Passive Recon

  • 6 - API Endpoint Analysis
  • 16 - API Endpoint Analysis

  • 7 - Broken Object Level Authorization
  • 17 - Broken Object Level Authorization Overview
  • 18 - Broken Object Level Authorization Practical 1
  • 19 - Broken Object Level Authorization Practical 2
  • 20 - Task.html

  • 8 - Broken Authentication
  • 21 - Broken Authentication Overview
  • 22 - Broken Authentication Practical 1
  • 23 - Broken Authentication Practical 2
  • 24 - Task.html
  • 25 - JSON Web Token Attacks and Vulnerabilities Overview
  • 26 - JSON Web Token Attacks Practical

  • 9 - Broken Function Level Authorization
  • 27 - Broken Function Level Authorization Overview
  • 28 - Broken Function Level Authorization Practical 1
  • 29 - Broken Function Level Authorization Practical 2
  • 30 - Task.html

  • 10 - Server Side Request Forgery
  • 31 - Server Side Request Forgery Overview
  • 32 - Server Side Request Forgery Practical 1
  • 33 - Server Side Request Forgery Practical 2
  • 34 - Task.html

  • 11 - Excessive Data Exposoure
  • 35 - Excessive Data Exposure Overview
  • 36 - Excessive Data Exposure Practical 1
  • 37 - Excessive Data Exposure Practical 2
  • 38 - Task.html

  • 12 - Lack of Resource and Rate Limiting
  • 39 - Lack of Resource and Rate Limiting Overview
  • 40 - Lack of Resource and Rate Limiting Practical 1
  • 41 - Lack of Resource and Rate Limiting Practical 2
  • 42 - Task.html

  • 13 - Mass Assignment
  • 43 - Mass Assignment Overview
  • 44 - Mass Assignment Practical 1
  • 45 - Mass Assignment Practical 2
  • 46 - Task.html

  • 14 - Injection Attacks
  • 47 - Injection Attacks Overview
  • 48 - Injection Attacks Practical 1
  • 49 - Injection Attacks Practical 2
  • 50 - Task.html

  • 15 - Improper Assets Management
  • 51 - Improper Assets Management Overview
  • 52 - Improper Assets Management Practical 1
  • 53 - Improper Assets Management Practical 2
  • 54 - Task.html

  • 16 - Security Misconfigurations
  • 55 - Security Misconfigurations Overview
  • 56 - Security Misconfigurations Practical 1
  • 57 - Security Misconfigurations Practical 2
  • 58 - Task.html

  • 17 - Insufficient Logging and Monitoring
  • 59 - Insufficient Logging and Monitoring Overview
  • 60 - Insufficient Logging and Monitoring Practical 1
  • 61 - Task.html

  • 18 - Bonus
  • 62 - Bonus lecture
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 41836
    حجم: 2287 مگابایت
    مدت زمان: 313 دقیقه
    تاریخ انتشار: 19 آذر 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید