Breaking The Graphql Bookstore API

Introduction Hello, welcome back to my blog. In this writeup, I鈥檒l walk you through how I was able to break the GraphQL Bookstore API developed by Ipsalmy, one of my mentors in this field. You can find the lab here: https://api.graphqlbook.org/ and the Github Repository too here: https://github.com/DghostNinja/graphql-bookstore-API. Don鈥檛 forget to star the GitHub repository to encourage him to create more awesome labs for the community. A special thanks also goes to HAWD for equipping me with practical API security skills through their intensive 12-week API program. That experience helped me approach this lab with the mindset of an attacker instead of just a tester. Now, enough with the warm-up. Let鈥檚 dive into the bookstore and start breaking things xD. ...

May 12, 2026 路 6 min 路 Appiah Bismark

Vulnerable RESTaurant API

Introduction I applied for the HackingAPIsWithDami challenge, and in the first week we were given some courses and the Vulnerable RESTaurant API Lab to test our hands on skills. The lab and installation guid can be found on here: Vulnerable RESTaurant API. NB: I hosted mine locally on ubuntu_server:8080, so the base URL in this write-up may differ from yours. In this write-up, I will be exploiting the API step by step and mapping each vulnerability to the OWASP API Top 10, including practical remediation strategies. ...

February 19, 2026 路 12 min 路 Appiah Bismark

Mastering SSRF | Solving all Portswigger Labs

Server Side Request Forgery(SSRF) is a vulnerability that allows attackers to send requests on behalf of a server, During an SSRF, attackers forge the request signatures of the vulnerable server, allowing them to assume a privileged position on a network, bypass firewall controls, and gain access to internal services. In this writeup, we will exxplore how to find some basic SSRFs and also how to bypass some SSRF protections. LAB 1: Basic SSRF against the local server Objective: This lab has a stock check feature which fetches data from an internal system. To solve the lab, change the stock check URL to access the admin interface at http://localhost/admin. ...

November 2, 2025 路 6 min 路 Appiah Bismark

How I Hacked A Vulnerable Bank Application

Introduction Good day hackers, welcome to my blog again. In this writeup i will take you through how i was able to exploit an intentional Vulnerable Bank Application by Ghost St. Badmus, One of the best Application Security Engineers in the industry. You can find the Lab here: Vulnerable Bank Application 馃彟 or vulnbank.org. Authentication & Authorization Vulnerabilities SQL Injection in login The first thing we will see when we access the application is the Login/Register page,we will try logging in with a simple SQLI payload to see if the application is vulnerable to SQLI. After using 鈥榦r 1=1- - as the username and pass as password,we were logged in as the admin. ...

June 14, 2025 路 7 min 路 Appiah Bismark

WebHacking-Recon Techniques

Introduction Hello Hackers, Hope you鈥檝e grinding hard and ethically? It鈥檚 been a while, In this writeup i will share some Reconnaissance techniques that will help you to succeed in your bug bounty or Web Application Hacking. As we all know Recon is a crucial stage in hacking, Exploiting a target system is quite easy if you know much about the system and how it works(hence my philosophy 80% recon, 20% exploitation).Enough talking, Let鈥檚 get our hands dirty!! ...

May 13, 2025 路 9 min 路 Appiah Bismark