PinnedIsrael Aráoz SevericheHacking APIs: Authentication & Authorization AttacksAs you know, API/Endpoints are called from many types of devices to receive information. In terms of security, your API/Endpoints must to…Nov 24, 20232Nov 24, 20232
Israel Aráoz SevericheSeguridad en Contenedores: Docker 101 Gestión de ImágenesEn el siguiente artículo describiré algunas aspectos básicos para la gestión de imágenes en docker.May 12May 12
Israel Aráoz SevericheSeguridad en Contenedores : Docker 101 FundamentosEn el objetivo de esta serie de articulos relacionados a contenedores es abordar de manera general la tecnologia con el objetivo de…May 9May 9
Israel Aráoz SevericheAPI Security: Essential Tools for Endpoint AnalysisIn today’s digital realm, fortifying APIs (Application Programming Interfaces) is imperative to shield sensitive data and uphold software…Mar 14Mar 14
Israel Aráoz SevericheWeb Security 101 : Cross-Site Scripting (XSS) AttacksIn this article, I would like to explain how XSS works,This is not a technically article, but I hope it will be useful for you, as it was…Feb 9Feb 9
Israel Aráoz SevericheWeb Security Academy — Business Logic Vulnerabilities WalkthroughThese kind of vulnerabilities are harder to detected by defensive security tools, they don’t involve injecting known payloads. In fact…Jan 16Jan 16
Israel Aráoz SevericheWeb Security Academy — API Security Testing WalkthroughOn my way to learning about API/Endpoints hacking in order sharpen my technical skills on security testing and improve my daily activities…Jan 5Jan 5
Israel Aráoz SevericheHacking APIs: From NoSQL Injection to Data ExposureIn this article I’d share a few common API/Endpoints attacks , for example noSQL Injection, Mass Assignment, Excessive Data Exposure and…Dec 29, 20231Dec 29, 20231
Israel Aráoz SevericheHacking APIs: Discovering & Enumeration API/EndpointThe hard ways is when you have list of API, but you don’t know where they come from or are called from, sometimes they are called from Web…Nov 14, 20231Nov 14, 20231
Israel Aráoz SevericheHacking APIs: Building the labDoing is one of the best ways to learn, so if you want to try to exploit or find vulnerabilities in API/Endpoint, you should practice.Nov 3, 20231Nov 3, 20231