Learn how to stay professionally detached from the vulnerabilities you discover and disclose as part of your security research. The post Why you should stay “professionally detached” from the vulns you find appeared first on Dana Epp's Blog.| Dana Epp's Blog
Learn why shadow APIs sometimes provide a defenseless path for threat actors, and learn what YOU can do about it. The post Why Shadow APIs provide a defenseless path for threat actors appeared first on Dana Epp's Blog.| Dana Epp's Blog
Let's explore the latest book by Packt Publishing on "Pentesting APIs" and see if it's worth putting on an API hacker's bookshelf. The post Is the latest book on “Pentesting APIs” any good? appeared first on Dana Epp's Blog.| Dana Epp's Blog
Learn how to use upstream residential and mobile proxies in Burp Suite to evade IP blocking during your API security testing. The post Evade IP blocking by using residential proxies appeared first on Dana Epp's Blog.| Dana Epp's Blog
Learn how to cross-reference Known Exploit Vulnerabilities (KEV) against CWE to find the best attack vectors to use during security testing. The post KEV + CWE = Attack Vector ❤️🔥 appeared first on Dana Epp's Blog.| Dana Epp's Blog
Learn how to write exploits that take advantage of blind command injection vulnerabilities using a time-delayed boolean oracle attack. The post From Exploit to Extraction: Data Exfil in Blind RCE Attacks appeared first on Dana Epp's Blog.| Dana Epp's Blog
Learn how to use JSON injection to manipulate API payloads to control the flow of data and business logic within an API. The post Attacking APIs using JSON Injection appeared first on Dana Epp's Blog.| Dana Epp's Blog
Learn five tips that will help improve the API exploits you submit into security triage as part of your vulnerability research. The post 5 tips to improve your API exploits appeared first on Dana Epp's Blog.| Dana Epp's Blog