Code a Yetishare - Advanced API Plugin

  • Status: Pending
  • Hadiah: €40
  • Entri Diterima: 0

Deskripsi Kontes

Script: yetishare.com

The standard api could be found under
https://fhscript.com/api/index.php (Note a key must be installed that the api works)

Here is the source code of the /api/index.php
http://pastebin.com/Lt2bdpLM

I need a plugin, where members can:
create api key
change/generate a new api key


api functions for members:
*upload files
*remote upload
*change file name
*check file info of own files(name, size, online/offline status)
*delete file

api functions for webmaster (webmaster must request a own API key. simply called "webmaster api key")
*check file info for all files of all members (name, size, online/offline status)


System should track:
*Refer of the last 30 days (IP, domainname, system, all what is possible) + Option to disable tracking by admin
*Same tracking for "webmaster api" + track the hits (how many request each day make a webmaster)

Admin functions:

*disable api key (member and webmaster)
*approve webmaster api key requests (webmaster should simply request a api key + domain info)

Keahlian yang Disarankan

Papan Klarifikasi Publik

  • RestiveX
    RestiveX
    • 8 tahun yang lalu

    You gave the file in which only visible command will check the API but which creates a new key - no. This work can be described as - hacking the existing system without any data. If you need a tool for generating a key API - you need to provide the source of the mechanism, which checks the key, or key generation algorithm. Without these data, equivalent to the following Project "I have a bank commands to the issuance of money, but the bank requires authentication. Write a program authentication procedure, I want to rob a bank."

    And so, we were able to read only the following lines: "
    $ api = new api ($ key, $ username);
    if (! $ api-> validateAccess ()) {die 'Could not validate api'; }
    "
    Which tells us about the existence of a certain class, referring to the existing key and login - we get a response of validity. But how and what is happening there - nobody knows. And how can we create a key that will be held validity? Brute? What if there AES-512 encryption?

    • 8 tahun yang lalu
  • atiqcsecu0506su
    atiqcsecu0506su
    • 8 tahun yang lalu

    budget is too low

    • 8 tahun yang lalu
    1. anojack
      Penyelenggara Kontes
      • 8 tahun yang lalu

      how much do you thing is a good budget?

      • 8 tahun yang lalu

Bagaimana untuk memulai sebuah kontes

  • Buat kontes Anda

    Buat Kontes Anda Cepat dan mudah

  • Dapatkan jutaan entri

    Dapatkan Jutaan Entri Dari seluruh dunia

  • Pilih entri terbaik

    Pilih entri terbaik Unggah file - Mudah!

Buat sebuah Kontes Sekarang atau Gabung dengan kami Hari ini!