Code a Yetishare - Advanced API Plugin

  • Status: Pending
  • Præmier: €40
  • Modtagne indlæg: 0

Konkurrence Instruktioner

Script: [url removed, login to view]

The standard api could be found under
[url removed, login to view] (Note a key must be installed that the api works)

Here is the source code of the /api/[url removed, login to view]
[url removed, login to view]

I need a plugin, where members can:
create api key
change/generate a new api key


api functions for members:
*upload files
*remote upload
*change file name
*check file info of own files(name, size, online/offline status)
*delete file

api functions for webmaster (webmaster must request a own API key. simply called "webmaster api key")
*check file info for all files of all members (name, size, online/offline status)


System should track:
*Refer of the last 30 days (IP, domainname, system, all what is possible) + Option to disable tracking by admin
*Same tracking for "webmaster api" + track the hits (how many request each day make a webmaster)

Admin functions:

*disable api key (member and webmaster)
*approve webmaster api key requests (webmaster should simply request a api key + domain info)

Anbefalede Evner

Offentlig Præciserings Opslagstavle

  • RestiveX
    RestiveX
    • 3 år siden

    You gave the file in which only visible command will check the API but which creates a new key - no. This work can be described as - hacking the existing system without any data. If you need a tool for generating a key API - you need to provide the source of the mechanism, which checks the key, or key generation algorithm. Without these data, equivalent to the following Project "I have a bank commands to the issuance of money, but the bank requires authentication. Write a program authentication procedure, I want to rob a bank."

    And so, we were able to read only the following lines: "
    $ api = new api ($ key, $ username);
    if (! $ api-> validateAccess ()) {die 'Could not validate api'; }
    "
    Which tells us about the existence of a certain class, referring to the existing key and login - we get a response of validity. But how and what is happening there - nobody knows. And how can we create a key that will be held validity? Brute? What if there AES-512 encryption?

    • 3 år siden
  • atiqcsecu0506su
    atiqcsecu0506su
    • 3 år siden

    budget is too low

    • 3 år siden
    1. anojack
      Konkurrenceafholder
      • 3 år siden

      how much do you thing is a good budget?

      • 3 år siden

Sådan kommer du i gang med konkurrencer

  • Opret din konkurrence

    Opret din konkurrence Hurtigt og nemt

  • Få tonsvis af indlæg

    Få tonsvis af indlæg Fra hele verden

  • Tildel det bedste indlæg

    Tildel det bedste indlæg Download filerne - Nemt!

Opret en Konkurrence Nu eller slut dig til os i dag!