Part 5: API Security Best Practices
This is the final part of the book. You have been learning how to discover, get information on, and attack APIs in different scenarios. Throughout the previous parts, vulnerable code has been presented to you with exploitable points in RESTful and GraphQL APIs. In this part, you will understand that a reasonable portion of security problems with APIs originate from bad coding practices. Knowing best practices is vital for securing APIs in a more appropriate way. When a pentester gets more acquainted with how the API code was written and which parts were ignored or forgotten by the developers, this can definitely help in the invasion journey.
This section contains the following chapter:
- Chapter 10, Secure Coding Practices for APIs