Dana Epp's Blog
Security (de)engineering for fun and profit
Learn how to stay professionally detached from the vulnerabilities you discover and disclose as part of your security research.
Learn why shadow APIs sometimes provide a defenseless path for threat actors, and learn what YOU can do about it.
Learn how to weaponize API discovery metadata to improve your recon of the APIs you are hacking or conducting security testing on.
Explore the misconceptions and anti-patterns of applying security testing to APIs, and how to address them.
Learn why Human Application Security Testing (HAST) is important to API hackers.
Explore why bug hunters should be more patient as vendors try to improve their application security maturity from a VDP to a BBP.
Check out these five tips to help you pick your first target when starting bug bounty hunting against APIs.
Learn about the five mistakes beginners make during their app recon that limit their ability to find vulns during their API security testing.
No soothsayer can predict what the threat landscape may look like in 2024. But check out these predictions of what API security may look like.
Read an intriguing real world story about how tainted data and API abuse can lead to the perfect digital bank heist.