SilverStr

Dana Epp's Blog

Security (de)engineering for fun and profit

  • About
  • Blog
  • Home
  • September 17, 2024

    Hacking Modern Android Mobile Apps & APIs with Burp Suite

    Hacking Modern Android Mobile Apps & APIs with Burp Suite

    Learn how to set up your hacking environment to attack mobile apps & APIs running on modern versions of Android with Burp Suite.

  • September 10, 2024

    Why the X-Bug-Bounty Header Matters for Hackers

    Why the X-Bug-Bounty Header Matters for Hackers

    Learn why the X-Bug-Bounty custom HTTP header can be helpful during your bug bounty engagements with a target.

  • September 3, 2024

    Detecting new API endpoints with oasdiff

    Detecting new API endpoints with oasdiff

    Gain a competitive edge over other security researchers by detecting changes to APIs before others even know about them by using oasdiff.

  • August 6, 2024

    Why API Security Testing Matters – Learning from Tracfone

    Why API Security Testing Matters – Learning from Tracfone

    Let’s look at Tracfone’s $16 million settlement with the FCC to understand why API security testing matters.

  • July 30, 2024

    Mapping Attack Patterns to your Threat Model

    Mapping Attack Patterns to your Threat Model

    Learn how to map MITRE CAPEC attack patterns to STRIDE threat model categories and improve your approach to security testing.

  • July 23, 2024

    Covert Data Exfiltration via JSON in an API

    Covert Data Exfiltration via JSON in an API

    Learn how to conduct covert data exfiltration within JSON payloads of an API response.

  • July 16, 2024

    Fuzzing JSON to find API security flaws

    Fuzzing JSON to find API security flaws

    Learn how to fuzz JSON to find security vulnerabilities in the APIs you are hacking with the help of a custom wordlist and Param Miner.

  • July 9, 2024

    Finding hidden API parameters

    Finding hidden API parameters

    Learn how to use Param Miner to find hidden parameters that may help manipulate an API in unintended ways, revealing potential security flaws.

  • July 2, 2024

    Weaponizing API discovery metadata

    Weaponizing API discovery metadata

    Learn how to weaponize API discovery metadata to improve your recon of the APIs you are hacking or conducting security testing on.

  • June 25, 2024

    Hacking APIs with HTTPie

    Hacking APIs with HTTPie

    Learn why HTTPie is a great replacement for curl and how to use it when conducting your own API security testing.

←Previous Page
1 2 3 4 … 13
Next Page→
 

Loading Comments...