Online Courses
API Penetration Testing Course
Online Courses
API Penetration Testing Course
  • Introduction
  • Setting Up
    • Tools
    • Hacking Lab
  • API Reconnaissance
    • Introduction to API Reconnaissance
    • Passive Reconnaissance
      • Google Dorking
      • GitDorking
      • TruffleHog
      • API Directories
      • Shodan
      • The Wayback Machine
    • Active Reconnaissance
      • Nmap
      • OWASP Amass
      • Directory Brute-force with Gobuster
      • Kiterunner
      • DevTools
      • Directory Brute-Forcing
  • Endpoint Analysis
    • Reverse Engineering an API
    • Excessive Data Exposure
    • Assessment
  • Scanning APIs
    • Finding Security Misconfigurations
    • Scanning APIs with OWASP ZAP
    • Assessment
  • Authentication Attacks
    • Classic Authentication Attacks
      • Note on Base64 Encoding
    • Token Attacks
    • Assessment
  • Exploiting API Authorization
    • Exploiting API Authorization
    • Broken Object Level Authorization (BOLA)
    • Broken Function Level Authorization (BFLA)
    • Assessment
  • Improper Assets Management
    • Improper Assets Management
    • Finding Improper Assets Management Vulnerabilities
    • Assessment
  • Mass Assignment
    • Mass Assignment Attacks
    • Other Mass Assignment Vectors
    • Hunting for Mass Assignment
    • Assessment
  • Exploiting Server-Side Request Forgery
    • Server-Side Request Forgery
    • Types of SSRF
    • Ingredients for SSRF
    • Testing for SSRF
    • Assessment
  • Injection Vulnerabilities
    • Testing for Injection Vulnerabilities
    • Discovering Injection Vulnerabilities
      • SQL Injection Metacharacters
      • NoSQL Injection
      • OS Injection
    • Fuzzing Wide with Postman
    • Fuzzing Deep with WFuzz
    • Assessment
  • Evasion and Combining Techniques
    • Evasive Maneuvers
    • Combining Techniques
Powered by GitBook
On this page
  • Course by APIsec University
  • Who is this for?
  • Index

Introduction

NextSetting Up

Last updated 9 months ago

Course by

The will guide you through actively testing web application programming interfaces (APIs) for security flaws. This course is a self-paced, practical guide that will show you the tools and techniques that can be leveraged to attack APIs. Although the skills that you will pick up in this course can be applied to a variety of APIs, the primary focus will be on REST APIs.

The ACE training will help you get your hands on the keyboard and walk you through the API hacking process. In this course, you will learn how to discover APIs, interact with endpoints, and exploit several weaknesses like Broken Authentication, Mass Assignment, and Broken Object Level Authorization. By the end of this course, you will have the skill set to thoroughly test web APIs.

Who is this for?

ACE is great for anyone interested in dedicating time to learning how to test APIs for security weaknesses. This course was meant to help improve the skills of bug bounty hunters, developers, and penetration testers. Before taking this course it would help to have a basic understanding of how web apps and APIs work.

The ACE course is completely free for anyone that wants to learn about API hacking. Those who would like to certify their knowledge can take the ACE exam. The ACE exam is a six-hour practical assessment of your ability to test APIs and find vulnerabilities. Students who pass the exam will receive the (ACE) certification.

Index

APIsec University
API Penetration Testing Course
Setting Up
Tools
Hacking Lab
API Reconnaissance
Introduction to API Reconnaissance
Passive Reconnaissance
Google Dorking
GitDorking
TruffleHog
API Directories
Shodan
The Wayback Machine
Active Reconnaissance
Nmap
OWASP Amass
Directory Brute-force with Gobuster
Kiterunner
DevTools
Endpoint Analysis
Reverse Engineering an API
Excessive Data Exposure
Assessment
Scanning APIs
Finding Security Misconfigurations
Scanning APIs with OWASP ZAP
Assessment
Authentication Attacks
Classic Authentication Attacks
Note on Base64 Encoding
API Token Attacks
Assessment
Exploiting API Authorization
Exploiting API Authorization
Broken Object Level Authorization (BOLA)
Broken Function Level Authorization (BFLA)
Assessment
Improper Assets Management
Improper Assets Management
Finding Improper Assets Management Vulnerabilities
Assessment
Mass Assignment Attacks
Mass Assignment Attacks
Other Mass Assignment Vectors
Hunting for Mass Assignment
Assessment
Exploiting Server-Side Request Forgery
Exploiting Server-Side Request Forgery
Types of SSRF
Ingredients for SSRF
Testing for SSRF
Assessment
Injection Vulnerabilities
Testing for Injection Vulnerabilities
Discovering Injection Vulnerabilities
SQL Injection Metacharacters
NoSQL Injection
OS Injection
Fuzzing Wide with Postman
Fuzzing Deep with WFuzz
Assessment
Evasion And Combining Techniques
Evasive Maneuvers
Combining Techniques