Chris Busse

Chris Busse edited this page Sep 15, 2016 · 3 revisions

Chris is CTO of APIvista, a professional services firm focused on helping organizations find success with their API programs. Before that he managed the API Consumer Services team for the Capital One DevExchange platform. He also co-organizes the API Craft RVA Meetup.

A native of Richmond, VA, he'll be taking a road trip via Charlotte, NC with one of his business partners to arrive at their first REST Fest.

  • See also chrisbusse.com for links to all his social networks & other online things.

Proposed Talks

Using mitmproxy / burp for reverse engineering undocumented APIs

  • Type: StackDay

  • Level: Intermediate

  • Description: mitmproxy/mitmdump and burp are both easy to use tools to reverse engineer undocumented APIs.

    During this workshop I will show how to setup these tools to intercept 3rd-party App traffic from my iOS device and display the API calls for inspection and analysis.

I would also like to foster a discussion about the "cultural" considerations of the reverse engineering activites that have happened around apps like Instagram, Snapchat, Pokemon GO, and others.

  • Background: NA
  • Slides: Live Demo
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.
Press h to open a hovercard with more details.