filmov
tv
GraphQL API Vulnerabilities: Accessing private GraphQL posts

Показать описание
#graphql #websecurity #graphqlapi #burpsuite
Hi!
There is a new topic published by PortSwigger on Web Security Academy!
- GraphQL API vulnerabilities
I want to share the solution of all the five labs, this is the first one:
Below there are the interesting resources to expand your knowledge on GraphQL API vulnerabilities and to easily comprehend the topic, It's well explained!
What is graphQL?
All labs:
Buy me a coffee:
About Me:
- Bachelor's Degree in Computer Engineering at Università Degli Studi Roma Tre
- Burp Suite Certified Practitioner (BSCP)
- eLearnSecurity Web Application Application Tester (eWPT)
- eLearnSecurity Web Application Application Tester eXtreme (eWPTx)
- Red Hat Certified System Administrator (RHCSA)
Social networks:
If you liked content, subscribed to my channel:
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Hi!
There is a new topic published by PortSwigger on Web Security Academy!
- GraphQL API vulnerabilities
I want to share the solution of all the five labs, this is the first one:
Below there are the interesting resources to expand your knowledge on GraphQL API vulnerabilities and to easily comprehend the topic, It's well explained!
What is graphQL?
All labs:
Buy me a coffee:
About Me:
- Bachelor's Degree in Computer Engineering at Università Degli Studi Roma Tre
- Burp Suite Certified Practitioner (BSCP)
- eLearnSecurity Web Application Application Tester (eWPT)
- eLearnSecurity Web Application Application Tester eXtreme (eWPTx)
- Red Hat Certified System Administrator (RHCSA)
Social networks:
If you liked content, subscribed to my channel:
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.