Udemy - Breaking Apis An Offensive Api Pentesting Course

dkmdkm

U P L O A D E R
dbc8ea3a9cd76e6eb9c18fb82280b38b.jpg

Free Download Udemy - Breaking Apis An Offensive Api Pentesting Course
Published 10/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.23 GB | Duration: 5h 13m
Offensive API Pentesting: Identify Vulnerabilities, Attack Weaknesses, and Enhance Defenses With Offensive Pentesting.

What you'll learn
Understand API Security Concepts
Identify and Exploit Common API Vulnerabilities
Perform Advanced API Pentesting Techniques
Report Findings and Provide Remediation Recommendations
Requirements
Basic Understanding of Web Technologies
Knowledge of Cybersecurity Concepts
Basic Understanding of Web Vulnerabilities
Description
APIs are the backbone of modern applications, enabling seamless interactions between services. However, their increasing presence makes them a prime target for attackers. "Breaking APIs: An Offensive API Pentesting Course" is designed to equip you with the offensive API pentesting skills necessary to find and exploit security flaws before malicious actors do.This course begins with the fundamentals of API architecture and HTTP protocols, followed by hands-on techniques for API enumeration and testing. You will explore essential tools like Postman and Burp Suite, learning how to map APIs and uncover potential weaknesses. Progressing into more advanced concepts, you will dive into common API security vulnerabilities, such as broken authentication, broken authorization, and misconfigurations.The course aligns with the OWASP API Security Top 10, tackling real-world vulnerabilities like Broken Object Level Authorization (BOLA), excessive data exposure, mass assignment, injection attacks, and improper asset management. Each module is designed to give you practical, hands-on experience in finding and exploiting these vulnerabilities, reinforcing your skills through detailed labs and challenges.Whether you're a penetration tester, security analyst, or developer, "Breaking APIs: An Offensive API Pentesting Course" will arm you with the skills and knowledge to secure APIs in today's threat landscape. By the end of this course, you will be prepared to conduct thorough API pentests, identify security risks, and protect sensitive data from emerging threats.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Introduction to API's
Lecture 3 What are REST API's ?
Lecture 4 Web Application Fundamentals
Lecture 5 Statefull and Stateless HTTP Reqests
Lecture 6 Types of API's
Lecture 7 API Authentication Process
Section 2: What Is API Pentesting ?
Lecture 8 What Is API Pentesting ?
Section 3: Lab Setup
Lecture 9 Lab Setup and Lab Overview
Section 4: Tools Setup
Lecture 10 Burpsuite Configurations
Lecture 11 Postman Dowload and Setup
Lecture 12 Postman Introduction
Section 5: Active and Passive Recon
Lecture 13 Introduction Of Active and Passive Recon
Lecture 14 Active Recon
Lecture 15 Passive Recon
Section 6: API Endpoint Analysis
Lecture 16 API Endpoint Analysis
Section 7: Broken Object Level Authorization
Lecture 17 Broken Object Level Authorization Overview
Lecture 18 Broken Object Level Authorization Practical #1
Lecture 19 Broken Object Level Authorization Practical #2
Lecture 20 Task
Section 8: Broken Authentication
Lecture 21 Broken Authentication Overview
Lecture 22 Broken Authentication Practical #1
Lecture 23 Broken Authentication Practical #2
Lecture 24 Task
Lecture 25 JSON Web Token Attacks and Vulnerabilities Overview
Lecture 26 JSON Web Token Attacks Practical
Section 9: Broken Function Level Authorization
Lecture 27 Broken Function Level Authorization Overview
Lecture 28 Broken Function Level Authorization Practical #1
Lecture 29 Broken Function Level Authorization Practical #2
Lecture 30 Task
Section 10: Server Side Request Forgery
Lecture 31 Server Side Request Forgery Overview
Lecture 32 Server Side Request Forgery Practical #1
Lecture 33 Server Side Request Forgery Practical #2
Lecture 34 Task
Section 11: Excessive Data Exposoure
Lecture 35 Excessive Data Exposure Overview
Lecture 36 Excessive Data Exposure Practical #1
Lecture 37 Excessive Data Exposure Practical #2
Lecture 38 Task
Section 12: Lack of Resource and Rate Limiting
Lecture 39 Lack of Resource and Rate Limiting Overview
Lecture 40 Lack of Resource and Rate Limiting Practical #1
Lecture 41 Lack of Resource and Rate Limiting Practical #2
Lecture 42 Task
Section 13: Mass Assignment
Lecture 43 Mass Assignment Overview
Lecture 44 Mass Assignment Practical #1
Lecture 45 Mass Assignment Practical #2
Lecture 46 Task
Section 14: Injection Attacks
Lecture 47 Injection Attacks Overview
Lecture 48 Injection Attacks Practical #1
Lecture 49 Injection Attacks Practical #2
Lecture 50 Task
Section 15: Improper Assets Management
Lecture 51 Improper Assets Management Overview
Lecture 52 Improper Assets Management Practical #1
Lecture 53 Improper Assets Management Practical #2
Lecture 54 Task
Section 16: Security Misconfigurations
Lecture 55 Security Misconfigurations Overview
Lecture 56 Security Misconfigurations Practical #1
Lecture 57 Security Misconfigurations Practical #2
Lecture 58 Task
Section 17: Insufficient Logging and Monitoring
Lecture 59 Insufficient Logging and Monitoring Overview
Lecture 60 Insufficient Logging and Monitoring Practical #1
Lecture 61 Task
Section 18: Bonus
Lecture 62 Bonus lecture
Security Consultants,Penetration Testers,Developers and DevOps Engineers,Cybersecurity Professionals
Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!




Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar
359020115_tuto.jpg

2.23 GB | 00:23:56 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English


Files Included :
1 - Introduction (28.99 MB)
2 - Introduction to APIs (38.99 MB)
3 - What are REST APIs (23.72 MB)
4 - Web Application Fundamentals (61.32 MB)
5 - Statefull and Stateless HTTP Reqests (14.94 MB)
6 - Types of APIs (44.29 MB)
7 - API Authentication Process (31.83 MB)
31 - Server Side Request Forgery Overview (15.42 MB)
32 - Server Side Request Forgery Practical 1 (30.01 MB)
33 - Server Side Request Forgery Practical 2 (15.71 MB)
35 - Excessive Data Exposure Overview (41.05 MB)
36 - Excessive Data Exposure Practical 1 (40.83 MB)
37 - Excessive Data Exposure Practical 2 (40.23 MB)
39 - Lack of Resource and Rate Limiting Overview (28.15 MB)
40 - Lack of Resource and Rate Limiting Practical 1 (27.27 MB)
41 - Lack of Resource and Rate Limiting Practical 2 (34.71 MB)
43 - Mass Assignment Overview (53.5 MB)
44 - Mass Assignment Practical 1 (18.23 MB)
45 - Mass Assignment Practical 2 (19.87 MB)
47 - Injection Attacks Overview (16.23 MB)
48 - Injection Attacks Practical 1 (58.68 MB)
49 - Injection Attacks Practical 2 (39.49 MB)
51 - Improper Assets Management Overview (38.63 MB)
52 - Improper Assets Management Practical 1 (59.49 MB)
53 - Improper Assets Management Practical 2 (34.67 MB)
55 - Security Misconfigurations Overview (41.57 MB)
56 - Security Misconfigurations Practical 1 (14.48 MB)
57 - Security Misconfigurations Practical 2 (20.85 MB)
59 - Insufficient Logging and Monitoring Overview (21.79 MB)
60 - Insufficient Logging and Monitoring Practical 1 (3.7 MB)
62 - Bonus lecture (1.44 MB)
8 - What Is API Pentesting (17.73 MB)
9 - Lab Setup and Lab Overview (60.58 MB)
10 - Burpsuite Configurations (30.1 MB)
11 - Postman Dowload and Setup (31.79 MB)
12 - Postman Introduction (59.75 MB)
13 - Introduction Of Active and Passive Recon (5.15 MB)
14 - Active Recon (126.2 MB)
15 - Passive Recon (223.58 MB)
16 - API Endpoint Analysis (99.47 MB)
17 - Broken Object Level Authorization Overview (122.73 MB)
18 - Broken Object Level Authorization Practical 1 (61.9 MB)
19 - Broken Object Level Authorization Practical 2 (45 MB)
21 - Broken Authentication Overview (62.57 MB)
22 - Broken Authentication Practical 1 (34.73 MB)
23 - Broken Authentication Practical 2 (42.44 MB)
25 - JSON Web Token Attacks and Vulnerabilities Overview (60.16 MB)
26 - JSON Web Token Attacks Practical (79.74 MB)
27 - Broken Function Level Authorization Overview (76.73 MB)
28 - Broken Function Level Authorization Practical 1 (64.72 MB)
29 - Broken Function Level Authorization Practical 2 (20.69 MB)

Screenshot
zQlhMouh_o.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar
537368816_que-es-udemy-analisis-opiniones.jpg

2.23 GB | 23min 56s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English


Files Included :
1 - Introduction.mp4 (28.99 MB)
2 - Introduction to APIs.mp4 (38.99 MB)
3 - What are REST APIs.mp4 (23.72 MB)
4 - Web Application Fundamentals.mp4 (61.32 MB)
5 - Statefull and Stateless HTTP Reqests.mp4 (14.94 MB)
6 - Types of APIs.mp4 (44.29 MB)
7 - API Authentication Process.mp4 (31.83 MB)
31 - Server Side Request Forgery Overview.mp4 (15.42 MB)
32 - Server Side Request Forgery Practical 1.mp4 (30.01 MB)
33 - Server Side Request Forgery Practical 2.mp4 (15.71 MB)
35 - Excessive Data Exposure Overview.mp4 (41.05 MB)
36 - Excessive Data Exposure Practical 1.mp4 (40.83 MB)
37 - Excessive Data Exposure Practical 2.mp4 (40.23 MB)
39 - Lack of Resource and Rate Limiting Overview.mp4 (28.15 MB)
40 - Lack of Resource and Rate Limiting Practical 1.mp4 (27.27 MB)
41 - Lack of Resource and Rate Limiting Practical 2.mp4 (34.71 MB)
43 - Mass Assignment Overview.mp4 (53.5 MB)
44 - Mass Assignment Practical 1.mp4 (18.23 MB)
45 - Mass Assignment Practical 2.mp4 (19.87 MB)
47 - Injection Attacks Overview.mp4 (16.23 MB)
48 - Injection Attacks Practical 1.mp4 (58.68 MB)
49 - Injection Attacks Practical 2.mp4 (39.49 MB)
51 - Improper Assets Management Overview.mp4 (38.63 MB)
52 - Improper Assets Management Practical 1.mp4 (59.49 MB)
53 - Improper Assets Management Practical 2.mp4 (34.67 MB)
55 - Security Misconfigurations Overview.mp4 (41.57 MB)
56 - Security Misconfigurations Practical 1.mp4 (14.48 MB)
57 - Security Misconfigurations Practical 2.mp4 (20.85 MB)
59 - Insufficient Logging and Monitoring Overview.mp4 (21.79 MB)
60 - Insufficient Logging and Monitoring Practical 1.mp4 (3.7 MB)
62 - Bonus lecture.mp4 (1.44 MB)
8 - What Is API Pentesting.mp4 (17.73 MB)
9 - Lab Setup and Lab Overview.mp4 (60.58 MB)
10 - Burpsuite Configurations.mp4 (30.1 MB)
11 - Postman Dowload and Setup.mp4 (31.79 MB)
12 - Postman Introduction.mp4 (59.75 MB)
13 - Introduction Of Active and Passive Recon.mp4 (5.15 MB)
14 - Active Recon.mp4 (126.2 MB)
15 - Passive Recon.mp4 (223.58 MB)
16 - API Endpoint Analysis.mp4 (99.47 MB)
17 - Broken Object Level Authorization Overview.mp4 (122.73 MB)
18 - Broken Object Level Authorization Practical 1.mp4 (61.9 MB)
19 - Broken Object Level Authorization Practical 2.mp4 (45 MB)
21 - Broken Authentication Overview.mp4 (62.57 MB)
22 - Broken Authentication Practical 1.mp4 (34.73 MB)
23 - Broken Authentication Practical 2.mp4 (42.44 MB)
25 - JSON Web Token Attacks and Vulnerabilities Overview.mp4 (60.16 MB)
26 - JSON Web Token Attacks Practical.mp4 (79.74 MB)
27 - Broken Function Level Authorization Overview.mp4 (76.73 MB)
28 - Broken Function Level Authorization Practical 1.mp4 (64.72 MB)
29 - Broken Function Level Authorization Practical 2.mp4 (20.69 MB)
]
Screenshot
sq6j4A7y_o.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Rapidgator links are free direct download only for my subscriber, other hosts are free download for free users
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten