ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

7,992 results

BSidesDFW
Intro to API Hacking

BSidesDFW 2022 Track 1 Session 3 - 05 Nov 2022 Intro to API Hacking APIs are everywhere, and they are a huge part of how the ...

47:04
Intro to API Hacking

260 views

3 years ago

DEFCONConference
DEF CON Safe Mode AppSec Village - David Sopas, Paulo Silva - API inSecurity TOP 10

Do you speak API? Surely you do, even if you don't notice them in your world wide web everyday use. APIs are proved to be ...

36:14
DEF CON Safe Mode AppSec Village - David Sopas, Paulo Silva - API inSecurity TOP 10

688 views

5 years ago

Gnar Coding
Learn to HACK and FIX API Vulnerabilities

APIs power the digital world, but without proper security, they can be vulnerable to attacks. In this video, we dive deep into how ...

20:39
Learn to HACK and FIX API Vulnerabilities

2,264 views

1 year ago

CNCF [Cloud Native Computing Foundation]
Keynote: Learn by Hacking: How to Run a 2,500 Node Kubernetes CTF - Andrew Martin & Andrés Vega

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon Europe in Amsterdam, The Netherlands from 18 - 21 ...

12:44
Keynote: Learn by Hacking: How to Run a 2,500 Node Kubernetes CTF - Andrew Martin & Andrés Vega

1,477 views

3 years ago

Data Theorem, Inc.
How Low Tech Hackers Hack Your API in 15min or Less

Learn how hackers target Shadow APIs and export large volumes of data with a few clicks of a button. Observe a very basic, yet ...

19:53
How Low Tech Hackers Hack Your API in 15min or Less

326 views

6 years ago

TechOmaha
Advice from a Former Hacker: Protecting API’s - Alissa Knight

For Cybersecurity Awareness Month, WiTH is excited to bring you a virtual presentation by author, film director and producer, ...

1:08:31
Advice from a Former Hacker: Protecting API’s - Alissa Knight

2,532 views

3 years ago

media.ccc.de
Hacking Containers, Kubernetes and Clouds

https://media.ccc.de/v/rc3-2021-cbase-247-hacking-containers-ku Tokens are a powerful way of controlling the access to to Rest ...

26:15
Hacking Containers, Kubernetes and Clouds

8,269 views

4 years ago

DEFCONConference
DEF CON 17 - Christopher Mooney and James Luedke - Subverting the World of Warcraft API

Subverting the World Of Warcraft API Christopher Mooney Software Engineer, Project DoD Inc. James Luedke Software Engineer, ...

52:11
DEF CON 17 - Christopher Mooney and James Luedke - Subverting the World of Warcraft API

2,650 views

12 years ago

Alex Followell | AI Automation
Claude is Now an AI Hacker! (Using Shannon AI Pentester)

I turned Claude Code into a fully autonomous AI pentester using Shannon. Watch it clone my SaaS app, spin up Docker ...

24:04
Claude is Now an AI Hacker! (Using Shannon AI Pentester)

4,738 views

1 month ago

OWASP Foundation
Global AppSec Dublin: Hacking And Defending APIs: Red And Blue Make Purple - Matt Tesauro

Managed by the OWASP® Foundation https://owasp.org/

53:06
Global AppSec Dublin: Hacking And Defending APIs: Red And Blue Make Purple - Matt Tesauro

573 views

3 years ago

AUTOHOTKEY Gurus
Hacking hidden APIs for noobs | Fiddler Everywhere

In this video Isaias and I show how to hack hidden APIs. We start off performing the actions we want with Chrome and monitor the ...

1:19:04
Hacking hidden APIs for noobs | Fiddler Everywhere

3,095 views

4 years ago

DEFCONConference
DEF CON 33 - How API flaws led to admin access to 1k+ USA dealers & control of yr car - Eaton Zveare

Many automotive dealers in the USA utilize centralized platforms for everything from sales to service to marketing.

22:26
DEF CON 33 - How API flaws led to admin access to 1k+ USA dealers & control of yr car - Eaton Zveare

686 views

5 months ago

BruCON Security Conference
05 - BruCON 0x10 - Bypassing firewalls with API-to-API Hacking - Johan Caluwé

In this talk we'll explore the opportunities that protocol & standards transformations provide for attackers in environments with an ...

50:53
05 - BruCON 0x10 - Bypassing firewalls with API-to-API Hacking - Johan Caluwé

1,109 views

1 year ago

HACK NYC
TECHDAY 5: HACKING WEB APPLICATION API’S

OWASP presents an exciting day packed with discussions and presentations about the latest security techniques. Hear from TOP ...

39:37
TECHDAY 5: HACKING WEB APPLICATION API’S

15,357 views

Streamed 8 years ago

PyCon Israel
Hacking Around Enumeration - Mark Geyzer - PyCon Israel 2019

Hacking Around Enumeration - Mark Geyzer - PyCon Israel 2019 ...

15:27
Hacking Around Enumeration - Mark Geyzer - PyCon Israel 2019

168 views

6 years ago

Gnar Coding
I Let AI HACK my Computer - Safely?

What happens when you give an AI full control over your terminal and let it try to "hack" your system? In this video, we push the ...

20:11
I Let AI HACK my Computer - Safely?

3,791 views

1 year ago

DEFCONConference
DEF CON 29 Biohacking Village - Alissa Knight, Mitch Parker - Playing with FHIR

Hear from renowned bank, automotive, and healthcare API Hacker Alissa Knight on her tactics and techniques in hacking ...

47:07
DEF CON 29 Biohacking Village - Alissa Knight, Mitch Parker - Playing with FHIR

1,348 views

4 years ago

OWASP Foundation
Topics of Interest: Hack Your APIs in 15 Minutes or Less - Himanshu Dwivedi

Topics of Interest: Hack Your APIs in 15 Minutes or Less SPEAKER Himanshu Dwivedi ABSTRACT This talk will discuss one of ...

26:11
Topics of Interest: Hack Your APIs in 15 Minutes or Less - Himanshu Dwivedi

124 views

4 years ago

DEFCONConference
DEF CON 31 - The Art of Compromising C2 Servers  A Web App Vulns Perspective - Vangelis Stykas

C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...

35:06
DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas

16,435 views

2 years ago

OWASP Foundation
May Lightning Event Featuring Katie Paxton-Fear

Managed by the OWASP® Foundation https://www.owasp.org/

1:05:05
May Lightning Event Featuring Katie Paxton-Fear

16,072 views

Streamed 4 years ago