🐼
Hacking APIs
Ctrlk
  • How web application works?
  • The Anatomy of Web API
  • API Insecurities
  • Setting up an API hacking system
  • API Targets
  • Discovering APIs
  • Endpoint analysis
  • Vulnerabilities
  • Attacking API auth
  • Fuzzing
  • Exploiting API Auth
  • Exploting Mass Assignment
  • API Injection
  • AWS
  • Writeups
  • Misc
    • Auth type
    • Brute Force - CheatSheet
    • Cryptography
      • JWT Handbook
      • Symmetric vs asymmetric algorithms
      • HS2562
      • RS256
    • Commands
    • XSS
  • Tools
  • Resources
  • Wordpress API
  • Prevention
Powered by GitBook
On this page
  1. Misc
  2. Cryptography

HS2562

PreviousSymmetric vs asymmetric algorithmsNextRS256