SilverStr

Dana Epp's Blog

Security (de)engineering for fun and profit

  • Home
  • Blog
  • About
  • September 30, 2022

    How to find access control issues in APIs

    How to find access control issues in APIs

    Learn how to hack APIs by exploiting authorization vulnerabilities.

  • September 27, 2022

    5 Books Every API Hacker Should Read

    5 Books Every API Hacker Should Read

    Check out the 5 essential books that every API hacker should read and keep on their bookshelf.

  • September 23, 2022

    The Bug Bounty Dilemma: When to give up on an API target

    The Bug Bounty Dilemma: When to give up on an API target

    Hacking APIs for fun and profit requires you to know how long to stay on target, and knowing when to give up. Let’s discuss.

  • September 20, 2022

    How to craft rogue API docs for a target when they don’t exist

    How to craft rogue API docs for a target when they don’t exist

    Learn how to reverse engineer an undocumented API using your own rogue docs.

  • September 16, 2022

    How to Detect the Programming Language of an API

    How to Detect the Programming Language of an API

    Learn 3 tricks that can help you discover the language an API was written in.

  • September 13, 2022

    Hardcoded cloud creds prove it’s easy for API hackers to win

    Hardcoded cloud creds prove it’s easy for API hackers to win

    Learn how API keys and tokens are being baked into mobile apps, and how you can win on #redteam because of this oversight.

  • September 9, 2022

    How to Make Money Hacking APIs

    How to Make Money Hacking APIs

    Learn about the careers you can get into to make money hacking APIs.

  • September 6, 2022

    Hackers abuse Yandex Taxi app API, causing massive traffic jam in Moscow

    Hackers abuse Yandex Taxi app API, causing massive traffic jam in Moscow

    When APIs are used as binary bullets in cyber warfare, we should all take notice. Read up on the latest hacks in the Anonymous vs Russia saga.

  • September 2, 2022

    Exploit APIs with cURL

    Exploit APIs with cURL

    Learn how to use cURL in your exploits and demonstrate impact to the API vulnerabilities you find.

  • August 30, 2022

    API Security Testing: How to Use OWASP guidance as your blueprint

    API Security Testing: How to Use OWASP guidance as your blueprint

    How to use OWASP guidance as your API security testing blueprint.

←Previous Page
1 … 3 4 5 6
Next Page→
 

Loading Comments...