Summary
In this chapter, we went through techniques used to bypass input validation controls as well as the importance of input validation mechanisms. While the list provided was not exhaustive, it covered the most common methods encountered in the wild. Additionally, we went through the use of encryption and decryption mechanisms within APIs and discussed safeguarding these mechanisms against malicious attackers. These components collectively form an API and should be developed with security in mind and as a top priority, protecting your organization from hackers.
In the next chapter, we will go into detail about API penetration testing and vulnerability assessment, along with how to write a report to clearly and comprehensively communicate your findings to your client.