Hack Your APIs in 15 Minutes or Less - Exploiting Shadow APIs and Data Vulnerabilities

Hack Your APIs in 15 Minutes or Less - Exploiting Shadow APIs and Data Vulnerabilities

OWASP Foundation via YouTube Direct link

API security

7 of 18

7 of 18

API security

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hack Your APIs in 15 Minutes or Less - Exploiting Shadow APIs and Data Vulnerabilities

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Hack in 15 Minutes or Less
  3. 3 What do hackers do
  4. 4 Research vs Hacking
  5. 5 How to defeat Machine Learning
  6. 6 Construction worker example
  7. 7 API security
  8. 8 API security in the news
  9. 9 API security in Australia
  10. 10 Same attack different app
  11. 11 misconfigured APIs
  12. 12 how did this happen
  13. 13 Decrypting the app
  14. 14 Detecting APIs
  15. 15 The Clever Part
  16. 16 Data Breaches
  17. 17 Science of the Tools
  18. 18 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.