Open in app

Sign in

Write

Sign in

hackysterio
hackysterio

73 Followers

Home

About

Sep 10

Fuzzing APIs

Fuzzing or Fuzz testing is an automated testing method where random, invalid, distorted, or unexpected input is given to an API Endpoint to see if any crashes or bugs emerge. The aim of Fuzzing is to identify unknown bugs and defects. API Fuzzing is a way of API testing that…

API

8 min read

Fuzzing APIs
Fuzzing APIs
API

8 min read


Aug 9

Matching Private Key Files with Certificate Files

In my earlier article — High Level Overview of the SSL/TLS process and Inspecting the contents of Google’s certificate — I’ve explained the contents of a certificate, and we saw that the Certificate is a file containing important information (we inspected each section of the Certificate). In the same vain…

4 min read

Matching Certificate files & Private Key files
Matching Certificate files & Private Key files

4 min read


Jul 27

Analyzing API Endpoints

Unlock the world of API Hacking with our upcoming series, tailor-made for beginners looking to become API security experts We are currently developing a comprehensive guide that will be released in its entirety by September 2023. In the meantime, I’m thrilled to share a sneak peek of what’s to come. …

Api Security

16 min read

Analyzing API Endpoints
Analyzing API Endpoints
Api Security

16 min read


Jul 27

High Level Overview of the SSL/TLS process and Inspecting the contents of Google’s certificate

Picture yourself navigating a website, only to be met with a glaring warning that reads, “Your connection is not private” Immediately, an alarm sets off in your mind, cautioning you against potential risks to your personal information. In contrast, you encounter another website that seamlessly loads, accompanied by a comforting…

8 min read

High Level Overview of the SSL/TLS process and Inspecting the contents of Google’s certificate
High Level Overview of the SSL/TLS process and Inspecting the contents of Google’s certificate

8 min read


May 18

Exploring the Intricacies of Online Security: My Adventures with Honeypots and SIEM

Have you ever wondered how hackers try to gain access to computers and devices connected to the internet? It’s a wild and sometimes scary world out there, filled with scanners, bots, and nefarious individuals trying to exploit WEAK SECURITY CONFIGURATIONS. Recently, I decided to turn the tables on these bad…

Siem

4 min read

Exploring the Intricacies of Online Security: My Adventures with Honeypots and SIEM
Exploring the Intricacies of Online Security: My Adventures with Honeypots and SIEM
Siem

4 min read

hackysterio

hackysterio

73 Followers

API Hacker || Technical Writer || Tech Tutor || "Pain from discipline is better than pain from regret"

Following
  • InfoSec Write-ups

    InfoSec Write-ups

  • Tumininu Olutayo

    Tumininu Olutayo

  • Madhumathi chamarthi

    Madhumathi chamarthi

  • Takshal(tojojo)

    Takshal(tojojo)

  • A’bdufattāh Sheu

    A’bdufattāh Sheu

See all (6)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams