API SEC

1. API Reconnaissance

Passive Reconnaissance

  • Google Dorks

  • Github Dorks

  • Shodan Dorks

  • Archive.org

Active Reconnaissance

  • Gobuster

  • Amass

2. Endpoint Analysis

3. Scanning APIs

  • OWASP ZAP

    • Import OpenAPI definition

    • Automated scanner - Manual Explore

4. API Authentication Attacks

5. Exploiting API Authorization

Broken Object Level Authorization (BOLA)

  • Search for IDs in URL and body parameters

Broken Function Level Authorization (BFLA)

  • Change IDs in CRUD request

6. Improper Assets Management

  • Check for old versions of the API : maybe it still contain old vulnerabilities

7. Mass Assignment

  • Overwrite object properties

  • Add parameters to the user registration process to escalate privilege

Last updated