Evade IP blocking by using residential proxies

Evade IP blocking by using residential proxies

Learn how to use upstream residential and mobile proxies in Burp Suite to evade IP blocking during your API security testing. The post Evade IP blocking by using residential proxies appeared first ...
This Bug Got Me A $30,000 Bounty

From Exploit to Extraction: Data Exfil in Blind RCE Attacks

Learn how to write exploits that take advantage of blind command injection vulnerabilities using a time-delayed boolean oracle attack. The post From Exploit to Extraction: Data Exfil in Blind RCE Attacks appeared ...
Attacking APIs using JSON Injection

Attacking APIs using JSON Injection

| | API Hacking Techniques
Learn how to use JSON injection to manipulate API payloads to control the flow of data and business logic within an API. The post Attacking APIs using JSON Injection appeared first on ...
Hacking Modern Android Mobile Apps & APIs with Burp Suite

Hacking Modern Android Mobile Apps & APIs with Burp Suite

Learn how to set up your hacking environment to attack mobile apps & APIs running on modern versions of Android with Burp Suite. The post Hacking Modern Android Mobile Apps & APIs ...
Why the X-Bug-Bounty Header Matters for Hackers

Why the X-Bug-Bounty Header Matters for Hackers

| | API Hacking Techniques
Learn why the X-Bug-Bounty custom HTTP header can be helpful during your bug bounty engagements with a target. The post Why the X-Bug-Bounty Header Matters for Hackers appeared first on Dana Epp's ...
Detecting new API endpoints with oasdiff

Detecting new API endpoints with oasdiff

Gain a competitive edge over other security researchers by detecting changes to APIs before others even know about them by using oasdiff. The post Detecting new API endpoints with oasdiff appeared first ...
Mapping Attack Patterns to your Threat Model

Mapping Attack Patterns to your Threat Model

| | API Hacking Techniques
Learn how to map MITRE CAPEC attack patterns to STRIDE threat model categories and improve your approach to security testing. The post Mapping Attack Patterns to your Threat Model appeared first on ...
Covert Data Exfiltration via JSON in an API

Covert Data Exfiltration via JSON in an API

| | API Hacking Techniques
Learn how to conduct covert data exfiltration within JSON payloads of an API response. The post Covert Data Exfiltration via JSON in an API appeared first on Dana Epp's Blog ...
Finding hidden API parameters

Finding hidden API parameters

Learn how to use Param Miner to find hidden parameters that may help manipulate an API in unintended ways, revealing potential security flaws. The post Finding hidden API parameters appeared first on ...
Weaponizing API discovery metadata

Weaponizing API discovery metadata

Learn how to weaponize API discovery metadata to improve your recon of the APIs you are hacking or conducting security testing on. The post Weaponizing API discovery metadata appeared first on Dana ...