Part 2: Attacking APIs
In this part, you will explore the techniques and approaches used by adversaries to attack APIs. This part is important for API defenders to understand how their APIs will be attacked, enabling them to defend themselves against common attack methods. The part covers the foundations of attacking APIs (covering common tools and methods), how to discover APIs in the real world, and then how to apply attack methods to overcome common API weaknesses and vulnerabilities.
This part has the following chapters:
- Chapter 5, Foundations of Attacking APIs
- Chapter 6, Discovering APIs
- Chapter 7, Attacking APIs