PinnedHacking APIs: Authentication & Authorization AttacksAs you know, API/Endpoints are called from many types of devices to receive information. In terms of security, your API/Endpoints must to…Nov 24, 20232Nov 24, 20232
Seguridad en Contenedores: Docker 101 Gestión de ImágenesEn el siguiente artículo describiré algunas aspectos básicos para la gestión de imágenes en docker.May 12May 12
Seguridad en Contenedores : Docker 101 FundamentosEn el objetivo de esta serie de articulos relacionados a contenedores es abordar de manera general la tecnologia con el objetivo de…May 9May 9
API Security: Essential Tools for Endpoint AnalysisIn today’s digital realm, fortifying APIs (Application Programming Interfaces) is imperative to shield sensitive data and uphold software…Mar 14Mar 14
Web Security 101 : Cross-Site Scripting (XSS) AttacksIn this article, I would like to explain how XSS works,This is not a technically article, but I hope it will be useful for you, as it was…Feb 9Feb 9
Web Security Academy — Business Logic Vulnerabilities WalkthroughThese kind of vulnerabilities are harder to detected by defensive security tools, they don’t involve injecting known payloads. In fact…Jan 16Jan 16
Web Security Academy — API Security Testing WalkthroughOn my way to learning about API/Endpoints hacking in order sharpen my technical skills on security testing and improve my daily activities…Jan 5Jan 5
Hacking APIs: From NoSQL Injection to Data ExposureIn this article I’d share a few common API/Endpoints attacks , for example noSQL Injection, Mass Assignment, Excessive Data Exposure and…Dec 29, 20231Dec 29, 20231
Hacking APIs: Discovering & Enumeration API/EndpointThe hard ways is when you have list of API, but you don’t know where they come from or are called from, sometimes they are called from Web…Nov 14, 20231Nov 14, 20231
Hacking APIs: Building the labDoing is one of the best ways to learn, so if you want to try to exploit or find vulnerabilities in API/Endpoint, you should practice.Nov 3, 20231Nov 3, 20231