SilverStr

Dana Epp's Blog

Security (de)engineering for fun and profit

  • About
  • Blog
  • Home
  • November 29, 2022

    3 reasons why QA people should get into API hacking

    3 reasons why QA people should get into API hacking

    Learn three reasons why QA people should get into API hacking to help secure their company’s apps.

  • November 22, 2022

    Tracing API exploitability through code review and taint analysis

    Tracing API exploitability through code review and taint analysis

    Learn how to find exploitable vulnerabilities in your APIs using taint analysis.

  • November 15, 2022

    3 Cyber Warfare Books Every API Hacker Should Read Over The Holidays

    3 Cyber Warfare Books Every API Hacker Should Read Over The Holidays

    Check out the 3 cyber warfare books every API hacker should read to learn about offensive security, past, present, and future.

  • November 8, 2022

    Attacking predictable GUIDs when hacking APIs

    Attacking predictable GUIDs when hacking APIs

    Learn how to predict and pwn GUIDs used in APIs.

  • November 1, 2022

    API Pentesting 101: The Rules of Engagement

    API Pentesting 101: The Rules of Engagement

    Learn the rules of engagement when pentesting APIs.

  • October 28, 2022

    7 Essential Burp Extensions for Hacking APIs

    7 Essential Burp Extensions for Hacking APIs

    Check out the coolest extensions to help out when hacking APIs in Burp.

  • October 25, 2022

    5 big mistakes beginners make hacking APIs

    5 big mistakes beginners make hacking APIs

    Avoid these beginner mistakes as you start your API hacking journey.

  • October 21, 2022

    Can SBOM help you attack APIs?

    Can SBOM help you attack APIs?

    Learn how you can leverage the data in a software bill of materials (SBOM) document to find vulnerabilities in API dependencies.

  • October 18, 2022

    Attacking Microsoft Graph with Postman

    Attacking Microsoft Graph with Postman

    Learn how to use Postman to attack the Microsoft Graph API.

  • October 14, 2022

    Automate your API hacking with Autorize

    Automate your API hacking with Autorize

    Learn how to find authorization vulnerabilities in APIs using Burp and Autorize.

←Previous Page
1 … 9 10 11 12 13
Next Page→
 

Loading Comments...