all InfoSec news
Exploiting API with AuthToken
InfoSec Write-ups - Medium infosecwriteups.com
Hallo fellow researchers,
Myself, Rafi Ahamed. I am a Cyber Security Researcher from Bangladesh. I love to do things differently. Anyway, without further ado let’s get to today’s topic.
Today’s topic is all about exploitation of API endpoints using AuthToken. Not about finding one.
Many of us finds AuthToken in our recon process but due not being able to show any impact this critical finding often gets rejected. I got rejected a few times myself.
What is an API? …
api bangladesh bug bounty critical cyber cyber security endpoints ethical hacking exploitation exploiting hacking impact infosec love process recon researcher researchers security security researcher things what is