Learn how to use upstream residential and mobile proxies in Burp Suite to evade IP blocking during your API security testing. The post Evade IP blocking by using residential proxies appeared first on Dana Epp's Blog.| Dana Epp's Blog
Learn how to write exploits that take advantage of blind command injection vulnerabilities using a time-delayed boolean oracle attack. The post From Exploit to Extraction: Data Exfil in Blind RCE Attacks appeared first on Dana Epp's Blog.| Dana Epp's Blog
Learn how to use JSON injection to manipulate API payloads to control the flow of data and business logic within an API. The post Attacking APIs using JSON Injection appeared first on Dana Epp's Blog.| Dana Epp's Blog
Learn how to conduct covert data exfiltration within JSON payloads of an API response.| Dana Epp's Blog
Learn how to use Param Miner to find hidden parameters that may help manipulate an API in unintended ways, revealing potential security flaws| Dana Epp's Blog
Learn how to improve your application security code reviews with the help of tools like graudit.| Dana Epp's Blog
Learn how to write Burp Suite extensions using the new Montoya API with Kotlin and Visual Studio Code (VS Code).| Dana Epp's Blog
Learn how to use artificial intelligence (AI) to discover sensitive data in the APIs you are hacking with the help of Microsoft Presidio.| Dana Epp's Blog
Nuclei can be used for more than vulnerability scanning. Learn how to leverage it as a tool for your API hacking.| Dana Epp's Blog
Learn how to bypass API rate limiting security controls using IP rotation in Burp Suite via Amazon API Gateway.| Dana Epp's Blog
Learn how to use the AI in Eyeballer from BishopFox to help identify interesting targets during recon of your web apps & APIs.| Dana Epp's Blog