API Testing Checklist
API Testing Checklist
62
Checkpoints:
1. Older APIs versions tend to be more vulnerable and they lack security mechanisms.
Leverage the predictable nature of REST APIs to find old versions.
Saw a call to 'api/v3/login'? Check if 'api/v1/login' exists as well. It might be more vulnerable.
3. Remember how SQL Injections used to be extremely common 5-10 years ago, and you could break
into almost every company? BOLA (IDOR) is the new epidemic of API security.
4. Testing a Ruby on Rails App & noticed an HTTP parameter containing a URL?
Developers sometimes use "Kernel#open" function to access URLs == Game Over.
Just send a pipe as the first character and then a shell command (Command Injection by design)
9. IDs in the HTTP bodies/headers tend to be more vulnerable than IDs in URLs. Try to focus on them
first.
14. Got stuck during an API pentest? Expand your attack surface! Find sub/sibling domains using
http://Virustotal.com & http://Censys.io.
Some of these domains might expose the same APIs with different configurations/versions.
16. Even if you use another web proxy, always use Burp in the background.
The guys at @PortSwigger
are doing a really good job at helping you manage your pentest.
Use the “tree view” (free version) feature to see all API endpoints you’ve accessed.
21. Got stuck during an API pentest? Expand the attack surface!
Use http://archive.com, find old versions of the web-app and explore new API endpoints.
Can't use the client? scan the .js files for URLs. Some of them are API endpoints.
28. Always try to send "INVALID CONTENT TYPE" you will end up getting hidden endpoints in
"RESPONSE".
30. GiHub Dorks for Finding API Keys, Tokens and Passwords
api_key
"api keys"
authorization_bearer:
oauth
auth
authentication
client_secret
api_token:
"api token"
client_id
password
user_password
user_pass
passcode
client_secret
secret
password hash
OTP
user auth
Glad it helped! :)
REPLY
REPLY
Enter Comment
Introduction Getting back to CTF solving after a looong break, is a difficult task. So, I
decided to proceed with an EASY challenge, and VulnHub was the obvious choice to
find the one. In few searches, I found a perfect machine to start with - 'The Planets: …
READ MORE
READ MORE
Powered by Blogger
Contributors
AKSHAY PANDURNGI
LATISH DANAWALE
Translate
Select Language
Powered by Translate
Archive
2020 (8)
October (1)
August (5)
July (2)
#Bugbountytips
2017 (1)
November (1)
SHOW LESS
Labels
Report Abuse