PinnedIsrael Aráoz SevericheHacking APIs: Authentication & Authorization AttacksAs you know, API/Endpoints are called from many types of devices to receive information. In terms of security, your API/Endpoints must to…4 min read·Nov 24, 2023--2--2
Israel Aráoz SevericheSeguridad en Contenedores : Docker 101 FundamentosEn el objetivo de esta serie de articulos relacionados a contenedores es abordar de manera general la tecnologia con el objetivo de…6 min read·2 days ago----
Israel Aráoz SevericheAPI Security: Essential Tools for Endpoint AnalysisIn today’s digital realm, fortifying APIs (Application Programming Interfaces) is imperative to shield sensitive data and uphold software…3 min read·Mar 14, 2024----
Israel Aráoz SevericheWeb Security 101 : Cross-Site Scripting (XSS) AttacksIn this article, I would like to explain how XSS works,This is not a technically article, but I hope it will be useful for you, as it was…3 min read·Feb 9, 2024----
Israel Aráoz SevericheWeb Security Academy — Business Logic Vulnerabilities WalkthroughThese kind of vulnerabilities are harder to detected by defensive security tools, they don’t involve injecting known payloads. In fact…5 min read·Jan 16, 2024----
Israel Aráoz SevericheWeb Security Academy — API Security Testing WalkthroughOn my way to learning about API/Endpoints hacking in order sharpen my technical skills on security testing and improve my daily activities…6 min read·Jan 5, 2024----
Israel Aráoz SevericheHacking APIs: From NoSQL Injection to Data ExposureIn this article I’d share a few common API/Endpoints attacks , for example noSQL Injection, Mass Assignment, Excessive Data Exposure and…4 min read·Dec 29, 2023--1--1
Israel Aráoz SevericheHacking APIs: Discovering & Enumeration API/EndpointThe hard ways is when you have list of API, but you don’t know where they come from or are called from, sometimes they are called from Web…4 min read·Nov 14, 2023--1--1
Israel Aráoz SevericheHacking APIs: Building the labDoing is one of the best ways to learn, so if you want to try to exploit or find vulnerabilities in API/Endpoint, you should practice.3 min read·Nov 3, 2023----
Israel Aráoz SevericheAPI Security 101Una de mis actividades diarias es la revisión y detección de posibles actividades sospechosas o accesos no autorizados, transferencias de…3 min read·Sep 16, 2023----