Discover ways to modify API requests during testing to corrupt data and manipulate code flow, allowing you to uncover new vulnerabilities.| Dana Epp's Blog
Learn how to use Param Miner to find hidden parameters that may help manipulate an API in unintended ways, revealing potential security flaws| Dana Epp's Blog
Learn why Human Application Security Testing (HAST) is important to API hackers.| Dana Epp's Blog