Exploiting API with AuthToken

What is an API?

Assumptions

Exploiting API via AuthToken

Pentester/Bug Bounty Hunter & A typical Business Undergraduate. (https://www.facebook.com/rafiahamed.rupak.3)

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Too many DeFi platforms, Dapps and Wallets to keep up with? 🤯

The 2nd ZKSwap Testnet Incentive Program ended with Over 16,000 Users Participating, and Bonus…

NGKEX opens a new chapter in the Internet of Everything

{UPDATE} Bonza Jigsaw Hack Free Resources Generator

[HackTheBox]Lame

{UPDATE} Field Trip Original Teacher Hack Free Resources Generator

Welcome aboard! 🚀

Understanding digital privacy today.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Rafi Ahamed (Leonidas D. Ace)

Rafi Ahamed (Leonidas D. Ace)

Pentester/Bug Bounty Hunter & A typical Business Undergraduate. (https://www.facebook.com/rafiahamed.rupak.3)

More from Medium

Reducing your brute-force attack time with Turbo intruder

Stored XSS into HTML

Testing for Local File Inclusion Vulnerability-Part 2

THM — File Inclusion WriteUp