APIsecurity
  • API Security for Rookies🐱‍👤
    • Lab Setup
      • Hacker's Kali Setup
      • API Hacking Lab
    • API Reconnaissance
      • Passive Reconnaissance
      • Active Reconnaissance
    • Endpoint Analysis
      • Reverse Engineering an API
      • Using APIs and Excessive Data Exposure
    • Scanning APIs
    • API Authentication Attacks
      • Classic Authentication Attacks
      • API Token Attacks
    • Exploiting API Authorization
      • BOLA
      • BFLA
    • Improper Asset Management
    • Mass Assignment
    • SSRF
    • Injection Attacks
    • Evasion & Combining Techniques
      • Evasive Maneuvers
      • Combining Techniques
    • Conclusion
Powered by GitBook
On this page
  • Introduction to Endpoint Analysis
  • Introduction
  1. API Security for Rookies🐱‍👤

Endpoint Analysis

PreviousActive ReconnaissanceNextReverse Engineering an API

Last updated 1 year ago

Introduction to Endpoint Analysis

Introduction

In this module, you will learn to reverse engineer API documentation, make API requests and analyze responses. In addition, you will learn how to test for Excessive Data Exposure.

Endpoint Analysis