From the course: CompTIA PenTest+ (PT0-003) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
API attacks and attack resources
From the course: CompTIA PenTest+ (PT0-003) Cert Prep
API attacks and attack resources
- As most IT infrastructures move more and more towards a distributed environment where there's all kinds of remote services being invoked, we see more and more risk associated with that architecture. So let's take a quick look at some of the API mechanisms that are commonly used to transport requests and data back and forth to invoke remote functionality. And an API is an application programming interface. Basically what it means, it allows one client, typically a remote client to invoke functionality that used to be just embedded inside a software application. It doesn't have to be remote, it can be local, but we're using a lot of remote APIs to invoke remote functionality and to transfer data back and forth. The cloud applications use this all the time as well as any distributed application. So let's look at some vulnerabilities with API and what kind of attacks we can use for APIs. Let's take a look at several of…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Application exploits, part 15m 23s
-
SQL injection demo8m 32s
-
(Locked)
Labtainers lab (SQL injection)2m 39s
-
(Locked)
Application exploits, part 27m 57s
-
(Locked)
Application exploits, part 38m 56s
-
(Locked)
Cross-site scripting demo6m 54s
-
(Locked)
Labtainers lab (cross-site scripting)1m 42s
-
(Locked)
Labtainers lab (cross-site request forgery)1m 20s
-
(Locked)
API attacks and attack resources6m 18s
-
(Locked)
Privilege escalation (Linux)9m 31s
-
(Locked)
Privilege escalation (Windows)6m 1s
-
(Locked)
Privilege escalation: Miscellaneous7m 49s
-
(Locked)
Local host vulnerabilities: Miscellaneous8m
-
(Locked)
Additional local host vulnerabilities2m 54s
-
(Locked)
-
-
-
-
-
-
-