API Hacking Mindset

Why you should stay “professionally detached” from the vulns you find
Learn how to stay professionally detached from the vulnerabilities you discover and disclose as part of your security research. The post Why you should stay “professionally detached” from the vulns you find ...

Why Shadow APIs provide a defenseless path for threat actors
Learn why shadow APIs sometimes provide a defenseless path for threat actors, and learn what YOU can do about it. The post Why Shadow APIs provide a defenseless path for threat actors ...

Weaponizing API discovery metadata
Learn how to weaponize API discovery metadata to improve your recon of the APIs you are hacking or conducting security testing on. The post Weaponizing API discovery metadata appeared first on Dana ...

7 Deadly Sins of API Security Testing
Explore the misconceptions and anti-patterns of applying security testing to APIs, and how to address them. The post 7 Deadly Sins of API Security Testing appeared first on Dana Epp's Blog ...

Why HAST is important to API hackers
Learn why Human Application Security Testing (HAST) is important to API hackers. The post Why HAST is important to API hackers appeared first on Dana Epp's Blog ...

Guts & Greed: How Bug Hunter Arrogance and Apathy Hurts Us All
Explore why bug hunters should be more patient as vendors try to improve their application security maturity from a VDP to a BBP. The post Guts & Greed: How Bug Hunter Arrogance ...

5 Tips for API Hackers on Picking Your First Target
Check out these five tips to help you pick your first target when starting bug bounty hunting against APIs. The post 5 Tips for API Hackers on Picking Your First Target appeared ...

5 mistakes beginners make during app recon
Learn about the five mistakes beginners make during their app recon that limit their ability to find vulns during their API security testing. The post 5 mistakes beginners make during app recon ...

Beyond the Crystal Ball: What API security may look like in 2024
No soothsayer can predict what the threat landscape may look like in 2024. But check out these predictions of what API security may look like. The post Beyond the Crystal Ball: What ...

That time I broke into an API and became a billionaire
Read an intriguing real world story about how tainted data and API abuse can lead to the perfect digital bank heist. The post That time I broke into an API and became ...