Code a Yetishare - Advanced API Plugin

  • Estado: Pending
  • Prêmio: €40
  • Inscrições Recebidas: 0

Síntese do concurso

Script: [login to view URL]

The standard api could be found under
[login to view URL] (Note a key must be installed that the api works)

Here is the source code of the /api/[login to view URL]
[login to view URL]

I need a plugin, where members can:
create api key
change/generate a new api key


api functions for members:
*upload files
*remote upload
*change file name
*check file info of own files(name, size, online/offline status)
*delete file

api functions for webmaster (webmaster must request a own API key. simply called "webmaster api key")
*check file info for all files of all members (name, size, online/offline status)


System should track:
*Refer of the last 30 days (IP, domainname, system, all what is possible) + Option to disable tracking by admin
*Same tracking for "webmaster api" + track the hits (how many request each day make a webmaster)

Admin functions:

*disable api key (member and webmaster)
*approve webmaster api key requests (webmaster should simply request a api key + domain info)

Habilidades Recomendadas

Painel de Esclarecimento Público

  • RestiveX
    RestiveX
    • 3 anos atrás

    You gave the file in which only visible command will check the API but which creates a new key - no. This work can be described as - hacking the existing system without any data. If you need a tool for generating a key API - you need to provide the source of the mechanism, which checks the key, or key generation algorithm. Without these data, equivalent to the following Project "I have a bank commands to the issuance of money, but the bank requires authentication. Write a program authentication procedure, I want to rob a bank."

    And so, we were able to read only the following lines: "
    $ api = new api ($ key, $ username);
    if (! $ api-> validateAccess ()) {die 'Could not validate api'; }
    "
    Which tells us about the existence of a certain class, referring to the existing key and login - we get a response of validity. But how and what is happening there - nobody knows. And how can we create a key that will be held validity? Brute? What if there AES-512 encryption?

    • 3 anos atrás
  • atiqcsecu0506su
    atiqcsecu0506su
    • 3 anos atrás

    budget is too low

    • 3 anos atrás
    1. anojack
      Proprietário do Concurso
      • 3 anos atrás

      how much do you thing is a good budget?

      • 3 anos atrás

Como começar com concursos

  • Publique seu concurso

    Poste seu Concurso Rápido e fácil

  • Receba toneladas de entradas

    Obtenha Toneladas de Inscrições De todo o mundo

  • Premie a melhor inscrição

    Premie a melhor inscrição Baixe os arquivos - fácil!

Poste um Concurso ou Junte-se a nós Hoje!