πŸ’»
Caesar3
search
⌘Ctrlk
πŸ’»
Caesar3
  • wind-turbineGeneral
    • square-terminalAbout Me
    • file-certificateCertification Reviews
  • flask-gearLabs
    • bug-slashWeb & API Penetration Testing
      • bugsPortSwigger
        • note-stickyNotes
        • spider-webAPI Testing
          • bug-slash1. Exploiting an API endpoint using documentation
          • bug-slash2. Exploiting server-side parameter pollution in a query string
          • bug-slash3. Finding and exploiting an unused API endpoint
          • bug-slash4. Exploiting a mass assignment vulnerability
          • bug-slash5. Exploiting server-side parameter pollution in a REST URL
        • spider-webCommand Injection
  • laptopCTF Machines
    • flag-pennantHackTheBox
    • flagTryHackMe
    • flag-swallowtailHackMyVm
    • font-awesomeOffsec PG
  • turtleCTF Challenges
    • kerningCryptoHack
    • flag-pennantPicoCTF
    • flag-checkeredOverTheWire
    • flagOthers
  • file-chart-pieMy Little Projects
    • hashtag-lockPassword Hasher
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. flask-gearLabschevron-right
  2. bug-slashWeb & API Penetration Testingchevron-right
  3. bugsPortSwigger

spider-webAPI Testing

bug-slash1. Exploiting an API endpoint using documentationchevron-rightbug-slash2. Exploiting server-side parameter pollution in a query stringchevron-rightbug-slash3. Finding and exploiting an unused API endpointchevron-rightbug-slash4. Exploiting a mass assignment vulnerabilitychevron-rightbug-slash5. Exploiting server-side parameter pollution in a REST URLchevron-right
PreviousNoteschevron-leftNext1. Exploiting an API endpoint using documentationchevron-right

Last updated 11 months ago