Jan. 15, 2023, 3:04 a.m. | Rafi Ahamed (Leonidas D. Ace)

InfoSec Write-ups - Medium infosecwriteups.com

Hallo fellow researchers,

Myself, Rafi Ahamed. I am a Cyber Security Researcher from Bangladesh. I love to do things differently. Anyway, without further ado let’s get to today’s topic.

Today’s topic is all about exploitation of API endpoints using AuthToken. Not about finding one.

Many of us finds AuthToken in our recon process but due not being able to show any impact this critical finding often gets rejected. I got rejected a few times myself.

What is an API? …

api bangladesh bug bounty critical cyber cyber security endpoints ethical hacking exploitation exploiting hacking impact infosec love process recon researcher researchers security security researcher things what is

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States

Information Assurance Security Specialist (IASS)

@ OBXtek Inc. | United States

Cyber Security Technology Analyst

@ Airbus | Bengaluru (Airbus)

Vice President, Cyber Operations Engineer

@ BlackRock | LO9-London - Drapers Gardens