API Pentesting Mindmap ATTACK
API Pentesting Mindmap ATTACK
API Pentesting Mindmap ATTACK
URL object
PDFs
etc
National IDs
Some web apps requires uploading
personal docs to register on them, and the
Personal docs Passports user should have access to his docs, and
these docs some times also named with it'
s owner ID.
etc
as a value in parameters
Phone number
IP Range spoofing
confidential / personal info
Passport Number
etc
etc
etc
etc
Broken function level authorization
When accessing some endpoints under e.g:
the 'admin' endpoint, some times can /api/v1/users/info?uID=1 Captcha reuse
retrieve sensitive info /api/v1/admin/users/info?uID=1
Weak captcha
Verbs & Endpoints manipulations
Here some applications blocks the
integers identifiers except the current e.g: Captcha Attacks Captcha implementation
userID, but if you put something like: 'all' /api/v1/users/?id=myID without using
can retrieve the whole application's users /api/v1/users/all
info's
etc
Api Pentesting
Weak credentials administrator:administrator
Weak authentication security
design High Privilege defaults
Mindmap
env root:toor
test etc
{{Attacking}} Default credentials
example guest:guest
publicly accessible productions
branches test:test
Low / custom privilege defaults
old releases user:user
Use of non-production resources which in most
cases not protected to attack the production Improper assets management
etc resources etc
Amount manipulation
Manipulate server's responses to bypass the
Business attack Response manipulation authentication mechanism in the dynamic
Currency manipulation applications.
etc
Weak API keys
Deletion of resources
Broken User Authentication API Keys attacks Use of leaked API Keys
Privilege escalation
Manipulating resources Privilege attack
e.g: {"is_admin":true}
Mass Assignment Improper API rotating
etc
etc
etc
XML Injection
etc.
etc
Timing attacks non-expiring JWTs, access tokens and sessions
e.g: S3 Buckets Exposed storage or server management panels Here the (BOLA) will be a part of the
attack to make the application's return
Information retrieval systems e.g: /api/orders/show?order_id=202
sensitive info [which isn't required but the
etc application retrieve it]
Comments endpoint
some applications returns more than the
required data, thus the attacker can
Excessive Data Exposure Messages endpoint access sensitive info's like CVV, location,
Communicative systems National Security Numbers ...etc.
Notifications endpoint
etc
Logging endpoints
etc