Code a Yetishare - Advanced API Plugin

  • Tila: Pending
  • Palkinto: €40
  • Vastaanotetut työt: 0

Kilpailun tehtävänanto

Script: [url removed, login to view]

The standard api could be found under
[url removed, login to view] (Note a key must be installed that the api works)

Here is the source code of the /api/[url removed, login to view]
[url removed, login to view]

I need a plugin, where members can:
create api key
change/generate a new api key


api functions for members:
*upload files
*remote upload
*change file name
*check file info of own files(name, size, online/offline status)
*delete file

api functions for webmaster (webmaster must request a own API key. simply called "webmaster api key")
*check file info for all files of all members (name, size, online/offline status)


System should track:
*Refer of the last 30 days (IP, domainname, system, all what is possible) + Option to disable tracking by admin
*Same tracking for "webmaster api" + track the hits (how many request each day make a webmaster)

Admin functions:

*disable api key (member and webmaster)
*approve webmaster api key requests (webmaster should simply request a api key + domain info)

Suositellut taidot

Julkinen selvennystaulu

  • RestiveX
    RestiveX
    • 2 vuotta sitten

    You gave the file in which only visible command will check the API but which creates a new key - no. This work can be described as - hacking the existing system without any data. If you need a tool for generating a key API - you need to provide the source of the mechanism, which checks the key, or key generation algorithm. Without these data, equivalent to the following Project "I have a bank commands to the issuance of money, but the bank requires authentication. Write a program authentication procedure, I want to rob a bank."

    And so, we were able to read only the following lines: "
    $ api = new api ($ key, $ username);
    if (! $ api-> validateAccess ()) {die 'Could not validate api'; }
    "
    Which tells us about the existence of a certain class, referring to the existing key and login - we get a response of validity. But how and what is happening there - nobody knows. And how can we create a key that will be held validity? Brute? What if there AES-512 encryption?

    • 2 vuotta sitten
  • atiqcsecu0506su
    atiqcsecu0506su
    • 2 vuotta sitten

    budget is too low

    • 2 vuotta sitten
    1. anojack
      Kilpailun järjestäjä
      • 2 vuotta sitten

      how much do you thing is a good budget?

      • 2 vuotta sitten

Kuinka päästä alkuun kilpailuiden kanssa

  • Julkaise kilpailusi

    Julkaise kilpailusi Nopeaa ja helppoa

  • Vastaanota tonnikaupalla osallistumisia

    Vastaanota tonnikaupalla osallistumisia Ympäri maailmaa

  • Palkitse paras hakemus

    Palkitse paras hakemus Lataa tiedostot - helppoa!

Ilmoita kilpailu nyt tai liity tänään!