PortSwigger- Finding and exploiting an unused API endpoint
Hello Folks, All web applications use an Application Programming Interface (API) which is also vulnerable if exploited by an attacker. So as a penetration tester, we should know how to identify and exploit these API-related vulnerabilities. In this blog, we will understand the complete process which starts from identifying API endpoints, supported HTTP methods, and […]
PortSwigger- Finding and exploiting an unused API endpoint Read More »