Reader small image

You're reading from  Defending APIs

Product typeBook
Published inFeb 2024
PublisherPackt
ISBN-139781804617120
Edition1st Edition
Right arrow
Author (1)
Colin Domoney
Colin Domoney
author image
Colin Domoney

Colin Domoney (BSc. MSc. CSSLP, CEH) is an API Security Research Specialist and Developer Advocate with deep expertise in the development of secure software. As VP of AppSec, he took on the challenge of securing software on a large scale and running the global AppSec program at Deutsche Bank. At Veracode, as an evangelist, he produces countless webinars, and blog posts, and speak globally at conferences. Currently, he has embraced the challenge of securing APIs with 42Crunch where he has produced the API industry's first security maturity model and contributed to numerous webinars, talks, and blogs. Currently, he is working on the industry's first defensive API developer training course. He is also the curator of the APISecurity weekly newsletter.
Read more about Colin Domoney

Right arrow

Understanding API attackers and their methods

In this opening section, we will examine the different methods a would-be attacker can employ to exploit an API, including passive and active traffic interception; finding API keys; fuzzing APIs for endpoints, their methods, and associated passwords; and cracking JSON Web Tokens (JWTs).

Using an appropriate combination of these methods will allow an attacker to launch a successful discovery phase on an API from where further specific attacks can be launched.

Interacting with APIs

APIs are, by their nature, headless; in other words, they do not expose a user interface that can be used to exercise their functionality. An attacker has many methods to interact with an API to discover and exploit weaknesses. Usually, the first step will be to passively examine API traffic using an intercepting proxy (such as Burp Suite) or with an API testing tool such as Postman. The attacker’s goal at this stage is to understand how the API...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Defending APIs
Published in: Feb 2024Publisher: PacktISBN-13: 9781804617120

Author (1)

author image
Colin Domoney

Colin Domoney (BSc. MSc. CSSLP, CEH) is an API Security Research Specialist and Developer Advocate with deep expertise in the development of secure software. As VP of AppSec, he took on the challenge of securing software on a large scale and running the global AppSec program at Deutsche Bank. At Veracode, as an evangelist, he produces countless webinars, and blog posts, and speak globally at conferences. Currently, he has embraced the challenge of securing APIs with 42Crunch where he has produced the API industry's first security maturity model and contributed to numerous webinars, talks, and blogs. Currently, he is working on the industry's first defensive API developer training course. He is also the curator of the APISecurity weekly newsletter.
Read more about Colin Domoney