All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
1:42
YouTube
Radware
What Is BOLA? | Broken Object Level Authorization Explained in 60 Seconds | API Security Risks
Welcome to another Radware Minute! In this quick video, Uri breaks down BOLA – Broken Object Level Authorization – one of the most common and dangerous API security vulnerabilities developers face today. What you'll learn: - What is BOLA and how it works - Real-world examples of how attackers exploit BOLA vulnerabilities - Why it ranks at ...
756 views
9 months ago
Related Products
API Example REST API Vulnerability Live
Ai Vulnerability PNG
Autocomplete Enabled Vulnerability
#OWASP Web Security Testing Guide
Master OWASP: Comprehensive Web Application Security Guide.
git.ir
Aug 27, 2024
Learn Bug Bounty Hunting & Web Security Testing From Scratch
git.ir
Feb 19, 2024
Top videos
16:52
API1 - Broken Object Level Authorization | IDOR | crAPI
YouTube
The Cyber Expert
16K views
Apr 6, 2023
0:12
API Security Best Practices: 1. Authentication and Authorization: Implement robust authentication and authorization mechanisms, such as OAuth, JWT, or Basic Auth. 2. Data Encryption: Use HTTPS (TLS/SSL) to encrypt data in transit. 3. Input Validation: Validate user input to prevent SQL injection, cross-site scripting (XSS), and other attacks. 4. Rate Limiting: Implement rate limiting to prevent brute-force attacks and denial-of-service (DoS) attacks. 5. Error Handling: Implement robust error han
Facebook
Cyber security and ethical
34.4K views
3 months ago
0:10
API vulnerability scanner interface showing security test results.
Adobe
ABDULELLAH
1 month ago
OWASP ZAP Tutorial
5:30
Hands-On Web Penetration Testing with Kali Linux: OWASP-ZAP|packtpub.com
YouTube
Packt
10.2K views
Oct 8, 2018
8:15
How to Use OWASP ZAP with WebGoat for Web Security Testing
YouTube
TechTales
1.9K views
Jan 17, 2025
58:47
Complete Zap Tutorial: How to Use OWASP ZAP for Web Application Security Testing
YouTube
Sonal
22.3K views
Jul 24, 2024
16:52
API1 - Broken Object Level Authorization | IDOR | crAPI
16K views
Apr 6, 2023
YouTube
The Cyber Expert
0:12
API Security Best Practices: 1. Authentication and Authorization
…
34.4K views
3 months ago
Facebook
Cyber security and ethical analysis
0:10
API vulnerability scanner interface showing security test results.
1 month ago
Adobe
ABDULELLAH
Qualys API Best Practices: Host List API | Qualys
Apr 14, 2021
qualys.com
2:15
⚠️ Broken Object Level Authorization (BOLA) in APIs | Ex
…
111 views
8 months ago
YouTube
HackSudo
5:12
How Hackers find BOLA in APIs?
2 views
1 week ago
YouTube
ProwlSec
Qualys API Best Practices: Host List Detection API | Qualys
Jul 9, 2021
qualys.com
1:46
Exploiting a Critical API Authentication Vulnerability in ve
…
229 views
1 month ago
YouTube
Polymorphic
9:33
Testing REST APIs for vulnerabilities
15.3K views
Jan 21, 2022
YouTube
MrTurvey
5:35
Test for BOLA Vulnerabilities with the free APIsec Scanner
564 views
1 year ago
YouTube
APIsec University
2:01
NEW API Vulnerability Scanner on Pentest-Tools.com
6.6K views
Aug 24, 2023
YouTube
Pentest-Tools
2:18
Account Reset link Bypass via Burpsuite – Understanding Vulner
…
2K views
Feb 27, 2025
YouTube
4get security
10:13
Finding Vulnerabilities and Hacking With OWASP ZAP
15.9K views
Apr 20, 2022
YouTube
SecNet Lab
21:47
API Security Testing with Postman: Best Practices and Techniques
29.5K views
Feb 12, 2021
YouTube
Postman
11:55
API PENETRATION TESTING: THE MASS ASSIGNMENT VULNERABI
…
4.8K views
Jun 6, 2023
YouTube
BePractical
27:39
How to Use Nessus in Kali to Identify Vulnerabilities to Exploit
…
59.5K views
Feb 9, 2019
YouTube
CISO Global
50:04
Webinar | Common Mistakes That Make APIs Vulnerable
198 views
Jan 9, 2025
YouTube
Kratikal Tech Ltd.
1:00
Nuclei Tool High Speed Automated Vulnerability Scanning Web, API
…
25 views
2 months ago
YouTube
Flayto
0:44
How to Test APIs for Security – Step by Step Guide
197 views
3 months ago
YouTube
Axximum Infosolutions
18:08
Automated REST API Vulnerability Detection with WuppieFuzz
76 views
3 months ago
YouTube
Nordic APIs
6:05
Perform a Vulnerability Scan Using OWASP Zed Attack Proxy
21.5K views
Apr 1, 2022
YouTube
CyberOffense
12:17
Microsoft Defender for Endpoint | API | Basics and Fundamentals
8.7K views
Jun 13, 2022
YouTube
Concepts Work
5:14
Build a Python Vulnerability Scanner | Search CVE
1.8K views
8 months ago
YouTube
Vinsloev Academy
24:54
Exploiting (and Patching) a Zero Day RCE Vulnerability in a Wester
…
48.2K views
Feb 25, 2021
YouTube
Flashback Team
7:20
Exploiting a Mass Assignment Vulnerability
12.4K views
Feb 26, 2024
YouTube
Intigriti
26:31
🟢 API SEC #4: LOGIN ሀክ ማድረግ | API VULNERABILITY
1.1K views
11 months ago
YouTube
Geez Tech ግዕዝ ቴክ
14:21
WordPress Vulnerability Scanning With WPScan
282K views
Jan 23, 2018
YouTube
HackerSploit
8:06
API Security Testing With Postman & OWASP Zap - A quick walkthrou
…
36.4K views
Oct 16, 2022
YouTube
TheTestTherapist
29:52
APISEC|CON: Find Your First API Vulnerability with Katie Paxton-Fear
1.1K views
May 22, 2024
YouTube
APIsec University
See more
More like this
Feedback