API Security Testing
Part 1:
https://smartbear.com/blog/test-and-monitor/api-security-testing-how-to-hack-an-api-part-1/
Part 2:
https://smartbear.com/blog/test-and-monitor/api-security-testing-how-to-hack-an-api-part-2/
Part 3:
https://smartbear.com/blog/test-and-monitor/api-security-testing-how-to-hack-an-api-part-3/
#API
@digmemore
Part 1:
https://smartbear.com/blog/test-and-monitor/api-security-testing-how-to-hack-an-api-part-1/
Part 2:
https://smartbear.com/blog/test-and-monitor/api-security-testing-how-to-hack-an-api-part-2/
Part 3:
https://smartbear.com/blog/test-and-monitor/api-security-testing-how-to-hack-an-api-part-3/
#API
@digmemore
SmartBear.com
API Security Testing – How to Hack an API and Get Away with It (Part 1 of 3)
In this 3-part blog series, I’ll provide deep dive instructions and specific examples on how you can avoid common security threats by hacking your own API. This first post will highlight 3 key aspects you will need to understand when hacking an API: API technologies…
Forwarded from CTF Community | Hints
در این رایت اپ میبینیم که چطور آسیب پذیری IDOR از طریق WebSocket اکسپلویت میشه.
https://footstep.ninja/posts/idor-via-websockets/
#WebSocket
#IDOR
@digmemore
https://footstep.ninja/posts/idor-via-websockets/
#WebSocket
#IDOR
@digmemore
footstep.ninja
cat ~/footstep.ninja/blog.txt
The HTML5 Herald