Summary
In this chapter, we explored how to test and exploit different API attack vectors using two vulnerable APIs: crAPI and BreachMe. We also explored different attack vectors that can be found in the wild. By doing so, you learned about different techniques and tools that you can add to your arsenal.
To summarize, to successfully exploit any vulnerability, you must determine what is causing the vulnerability. This ensures that you can also mitigate it to keep your organization secure. Because different APIs have distinct attack vectors, it is also critical to understand the vectors that affect the type of API you wish to pentest.
In the next chapter, we will dive deeper into ways attackers can bypass implemented API authentication and authorization controls.