Part 4: API Advanced Topics
You can achieve good attack rates with the topics covered in Part 3. They are foundational but still very effective. However, there are some situations in which you have to make use of something more sophisticated. We are talking about advanced attack techniques, which are covered in this part. You will be presented with ways in which to detect data exposure and leakage. You will also learn what API business logic is and how you can leverage bad implementations of it to gain unauthorized access and do unauthorized actions. As was the case with Part 3, you will be presented with some recommendations on how to avoid problems with this critical part of any API.
This section contains the following chapters:
- Chapter 8, Data Exposure and Sensitive Information Leakage
- Chapter 9, API Abuse and Business Logic Testing