* Cantinho Satkeys

Refresh History
  • FELISCUNHA: ghyt74  pessoal   4tj97u<z
    10 de Março de 2026, 11:00
  • j.s.: dgtgtr a todos  49E09B4F 49E09B4F
    09 de Março de 2026, 17:12
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana  4tj97u<z
    07 de Março de 2026, 11:37
  • JPratas: try65hytr Pessoal  4tj97u<z 2dgh8i k7y8j0 yu7gh8
    06 de Março de 2026, 05:31
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    04 de Março de 2026, 10:47
  • Kool.king1: french
    02 de Março de 2026, 22:47
  • j.s.: dgtgtr a todos  49E09B4F
    01 de Março de 2026, 16:54
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  101041
    01 de Março de 2026, 10:42
  • cereal killa: try65hytr pessoal e bom fim semana de solinho  535reqef34 r4v8p
    28 de Fevereiro de 2026, 20:31
  • FELISCUNHA: ghyt74  Pessoal   4tj97u<z
    27 de Fevereiro de 2026, 10:51
  • JPratas: try65hytr Pessoal  4tj97u<z 2dgh8i k7y8j0 classic
    27 de Fevereiro de 2026, 04:57
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  4tj97u<z
    22 de Fevereiro de 2026, 11:06
  • j.s.: tenham um excelente fim de semana  49E09B4F 49E09B4F
    21 de Fevereiro de 2026, 21:12
  • j.s.: try65hytr a todos  49E09B4F
    21 de Fevereiro de 2026, 21:12
  • Paulo Martins: Sportify
    21 de Fevereiro de 2026, 19:15
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana  4tj97u<z
    21 de Fevereiro de 2026, 11:07
  • JPratas: try65hytr Pessoal 4tj97u<z 2dgh8i k7y8j0 classic
    20 de Fevereiro de 2026, 04:50
  • j.s.: dgtgtr a todos  49E09B4F
    17 de Fevereiro de 2026, 13:55
  • FELISCUNHA: ghyt74   49E09B4F  e bom carnaval
    17 de Fevereiro de 2026, 10:38
  • sacana10: Bom dia a todos
    15 de Fevereiro de 2026, 13:14

Autor Tópico: Attacking MCP Servers and AI Apps A Practical Course  (Lida 81 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Offline WAREZBLOG

  • Moderador Global
  • ***
  • Mensagens: 6409
  • Karma: +0/-0
Attacking MCP Servers and AI Apps A Practical Course
« em: 12 de Janeiro de 2026, 09:59 »

Free Download Attacking MCP Servers and AI Apps  A Practical Course
Published 1/2026
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 422.51 MB | Duration: 1h 12m
Exploiting and defending MCP servers, the backbone of AI Agents. No prior knowledge required. All labs are in Docker.

What you'll learn
Understand the problem that MCP solves.
Build MCP servers in Python with tools, resources, and prompts using FastMCP SDK
Exploit common vulnerabilities on MCP (SSRF, confused deputy, prompt injection)
Test your skills with bonus exercises covering directory traversal, command injection, and internal endpoint bypass
Requirements
Basic Python skills
Description
Companies rush to integrate MCP servers into their AI infrastructure, a new attack surface is emerging - and most developers are building vulnerable systems without realizing it.This hands-on course takes you from zero MCP knowledge to confidently building and attacking MCP servers. Whether you're a developer securing AI systems or a security professional hunting for vulnerabilities, this course gives you the practical skills you need.No complex setup required - all labs run in Docker containers with step-by-step guidance. Join thousands of students already learning to secure the next generation of AI infrastructure.In Section 1, you'll build a solid foundation by creating your first MCP server in Python using the FastMCP SDK. You'll understand the client-server architecture, learn the difference between local and remote MCP servers, and integrate your server with Claude Desktop. By the end, you'll know how to expose tools, resources, and prompts to AI models - and more importantly, you'll understand where things can go wrong.In Section 2, you shift to an attacker's mindset. Through practical labs running in Docker, you'll exploit real vulnerabilities including: - Server-Side Request Forgery (SSRF) - Abuse URL fetching tools to access internal resources, and bypass common protections using redirect chains - Confused Deputy attacks - Exploit broken authorization when MCP servers have overly broad access to backend services - Prompt Injection - Manipulate AI-generated SQL queries to access unauthorized data, with a real-world case study of Google Antigravity credential exfiltration - Directory Traversal and Information Disclosure - Extract sensitive files through misconfigured MCP resources.
Security Engineers, Software Engineers,Bug Bounty Hunters, Penetration Testers
Homepage
Código: [Seleccione]
https://www.udemy.com/course/attacking-mcp-servers-and-ai-apps-a-practical-course/
Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
No Password  - Links are Interchangeable