Hello,
First episode of a new series focusing on vulnerability research. Today, in episode 1/2, we delve into research on Kong and Konga.
Before diving deep into the subject in part 2 (coming out next week), we go over the basics of what an API gateway is, how NGINX works (as a proxy/reverse proxy), LUA code, and a brief demonstration of Konga and Kong!
00:00 - Intro, concept presentation
00:46 - Video topic presentation
01:48 - What is Kong?
02:14 - Demystifying an API
03:22 - Demystifying a gateway
04:58 - What is Kong technically?
05:20 - Explanation of NGINX, proxy, and reverse proxy
07:06 - And what about Konga?
07:41 - Konga and Kong demonstration
08:47 - Docker compose presentation
09:54 - Admin creation at boot
10:25 - Konga UX demonstration
11:31 - Adding a service
11:50 - Route creation and demo
13:17 - Presentation of plugins
15:56 - Outro
Thumbnail: @gurvanseveno3498
=[ Social ]=
→ My X (lul): / fransosiche
→ Laluka's X: / thelaluka
=[ Sources ]=
→ / improve-your-kong-plug...
→ thinkloveshare.com/hacking/ko...
#cybersecurity #security #kong #konga #api #gateway #research
Негізгі бет Ғылым және технология The HIDDEN Side of APIs: Vulnerability Discovery on Kong & Konga with @TheLaluka | Part 1
Пікірлер: 5