OWASP Top 10: API Security Playbook

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 200.3 MB
  • Uploaded By Source1337
  • Downloads 509
  • Last checked 2 days ago
  • Date uploaded 4 years ago
  • Seeders 8
  • Leechers 3

Infohash : 888FC1A8182D9074204F3EBF6A77722CE01A231A



Quote:

We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without โ€œThemโ€, you and we wonโ€™t be here having this conversation. Think about it! โ˜ฎ๏ธ Peace.โœŒ๏ธ


Files:

OWASP Top 10- API Security Playbook 08. Security Misconfiguration
  • 02. Common Security Misconfigurations.mp4 (9.9 MB)
  • 00. Overview.mp4 (7.6 MB)
  • 00. Overview.srt (8.8 KB)
  • 01. Understanding a Vulnerable CORS Implementation.mp4 (7.9 MB)
  • 01. Understanding a Vulnerable CORS Implementation.srt (8.1 KB)
  • 02. Common Security Misconfigurations.srt (10.3 KB)
00. Course Overview
  • 00. Course Overview.srt (2.3 KB)
  • 00. Course Overview.mp4 (3.3 MB)
01. Using the OWASP API Top 10
  • 6 Simple Memory Techniques.html (0.1 KB)
  • 00. Goals of the API Top 10.mp4 (8.0 MB)
  • 00. Goals of the API Top 10.srt (7.8 KB)
  • 01. Vulnerability Risk Factors.mp4 (5.7 MB)
  • 01. Vulnerability Risk Factors.srt (6.3 KB)
02. Broken Object Level Authorization
  • 00. Overview.mp4 (3.1 MB)
  • 00. Overview.srt (3.5 KB)
  • 01. Attacking Broken Object Level Authorization.mp4 (7.2 MB)
  • 01. Attacking Broken Object Level Authorization.srt (7.9 KB)
  • 02. Defending Against Broken Object Level Authorization.mp4 (4.5 MB)
  • 02. Defending Against Broken Object Level Authorization.srt (4.8 KB)
  • USB Rubber Ducky Deluxe.html (0.1 KB)
03. Broken User Authentication
  • 00. Understanding Broken Authorization.mp4 (7.2 MB)
  • 00. Understanding Broken Authorization.srt (7.7 KB)
  • 01. Storing Passwords Securely.mp4 (4.4 MB)
  • 01. Storing Passwords Securely.srt (5.0 KB)
  • 02. Credential Stuffing.mp4 (3.3 MB)
  • 02. Credential Stuffing.srt (3.0 KB)
  • 03. Common JWT Failures.mp4 (5.2 MB)
  • 03. Common JWT Failures.srt (5.5 KB)
  • 04. Using API Keys.mp4 (4.6 MB)
  • 04. Using API Keys.srt (5.2 KB)
  • Yubico - YubiKey 5 NFC.html (0.1 KB)
04. Excessive Data Exposure
  • 00. Overview.mp4 (5.5 MB)
  • 00. Overview.srt (5.7 KB)
  • 01. Attacking Excessive Data Exposure.mp4 (4.9 MB)
  • 01. Attacking Excessive Data Exposure.srt (5.0 KB)
  • 02. Defending Against Excessive Data Exposure.mp4 (3.3 MB)
  • 02. Defending Against Excessive Data Exposure.srt (3.8 KB)
05. Lack of Resource and Rate Limiting
  • 00. Overview.mp4 (3.8 MB)
  • 00. Overview.srt (4.3 KB)
  • 01. Attacks on Rate Limiting Vulnerabilities.mp4 (5.7 MB)
  • 01. Attacks on Rate Limiting Vulnerabilities.srt (5.7 KB)
  • 02. Rate Limiting Risks.mp4 (3.3 MB)
  • 02. Rate Limiting Risks.srt (3.3 KB)
  • 03. Rate Limiting Defenses.mp4 (6.1 MB)
  • 03. Rate Limiting Defenses.srt (5.9 KB)
06. Broken Function Level Authorization
  • 00. Overview.mp4 (3.3 MB)
  • 00. Overview.srt (3.3 KB)
  • 01. Attacks on Function Level Authorization.mp4 (7.2 MB)
  • 01. Attacks on Function Level Authorization.srt (7.4 KB)
  • 02. Function Level Authorization Defenses.mp4 (3.9 MB)
  • 02. Function Level Authorization Defenses.srt (4.2 KB)
  • Linux Tails Operating System.html (0.1 KB)
07. Mass Assignment
  • 00. Overview.mp4 (4.6 MB)
  • 00. Overview.srt (4.7 KB)
  • 01. Attacking Mass Assignment Vulnerabilities.mp4 (4.7 MB)
  • 01. Attacking Mass Assignment Vulnerabilities.srt (4.8 KB)
  • 02. Mass Assignment Defenses.mp4 (3.3 MB)
  • 02. Mass Assignment Defenses.srt (3.7 KB)
09. Injection
  • 00. Overview.mp4 (4.0 MB)
  • 00. Overview.srt (4.2 KB)
  • 01. Attacking Injection Vulnerabilities.mp4 (7.6 MB)
  • 01. Attacking Injection Vulnerabilities.srt (7.8 KB)
  • 02. Injection Risks.mp4 (4.9 MB)
  • 02. Injection Risks.srt (4.5 KB)
  • 03. Injection Defenses.mp4 (9.9 MB)
  • 03. Injection Defenses.srt (10.2 KB)
10. Improper Assets Management
  • 00. Overview.mp4 (4.2 MB)
  • 00. Overview.srt (4.5 KB)
  • 01. Attacks on Improper Asset Management.mp4 (9.2 MB)
  • 01. Attacks on Improper Asset Management.srt (7.9 KB)
  • 02. Defending Your Assets.mp4 (5.7 MB)
  • 02. Defending Your Assets.srt (5.6 KB)
11. Insufficient Logging and Monitoring
  • 00. Overview.mp4 (4.7 MB)
  • 00. Overview.srt (5.2 KB)
  • 01. Effects of Insufficient Logging and Monitoring.mp4 (3.4 MB)
  • 01. Effects of Insufficient Logging and Monitoring.srt (3.2 KB)
  • 02. Logging and Monitoring for Defense.mp4 (4.9 MB)
  • 02. Logging and Monitoring for Defense.srt (5.4 KB)
  • LIFX 1100-Lumen.html (0.1 KB)
  • Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html (0.1 KB)

Comments

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.moeking.me:6969/announce
  • http://tracker-cdn.moeking.me:2095/announce
  • udp://wassermann.online:6969/announce
  • udp://vibe.community:6969/announce
  • udp://valakas.rollo.dnsabr.com:2710/announce
  • udp://udp-tracker.shittyurl.org:6969/announce
  • udp://tracker1.bt.moack.co.kr:80/announce
  • udp://tracker0.ufibox.com:6969/announce
  • udp://tracker.zerobytes.xyz:1337/announce
  • udp://tracker.zemoj.com:6969/announce
  • udp://tracker.v6speed.org:6969/announce
  • udp://tracker.uw0.xyz:6969/announce
REVERSE-PROXY ๐Ÿ”„ RP (success) | 1754ms ๐Ÿ“„ torrent ๐Ÿ• 17 Jan 2026, 12:49:21 am IST โฐ 11 Feb 2026, 12:49:21 am IST โœ… Valid for 24d 23h ๐Ÿ”„ Wait 10m