SlideShare a Scribd company logo
API Testing and Hacking
By : Vishwas Narayan
Developer
Testers
Q/A
We Developed faster failed quicker and implemented faster(thanks to devops engineers)
But we Forgot
Security
We worked liked machines and forgot we are human beings
We have “trust” for Each other
is a Vulnerability
• Connections
• Users
• Content
• URLs
• Files in the endpoints
• New files
• Devices
• ….
Firewall AuthN AuthZ
URL Filtering
IDS/ IPS
Anti-virus
Sandboxing IoT Security
Cryptography
Trust issues lies everywhere
Software is Eating the world
Software is Eating the world
Custom
Code
Open
Source
Software
Infrastructure
as Code
Container
Manifest
Files
Scaling
Platforms
Software
Patches
● 80-90 percent of the code is
open source
● 80% of the code is found in
the Indirect Dependency
● Millions of the imports
● Agile is a Curse to Some
Extent of the Development
● The Beauty of the Code is
its Scalable and Reusable
● Happy Dev and Happy Bugs
in the Production
● Agile is a Blessing
Custom
Wrappers /
Frameworks
We all built solutions?
Think web 3.0
Open Port number 22 with Web3.0 Application
implemented
What's Dangerous is
What's even more Dangerous is
Source : A6: Security Misconfiguration ❗ -
Top 10 OWASP 2017 (wallarm.com)
We have to learn how to miconfigure
What is an API?
● API stands for Application Programming Interface. In the context of APIs,
the word Application refers to any software with a distinct function.
● Interface can be thought of as a contract of service between two applications.
● This contract defines how the two communicate with each other using
requests and responses.
According to Wikipedia
“An application programming interface is a way for two or more computer
programs to communicate with each other. It is a type of software interface,
offering a service to other pieces of software. A document or standard that
describes how to build or use such a connection or interface is called an API
specification.”
Simple Analogy
● It's a Socket that communicates with the different services.
● Its a Source of Communication that takes the front end and connected the
backend of the different services
● Its a doesn't care source that is coming in the picture its just a dumb formator
of the code that needs more security
● Today's blessing of multiple language and abstraction as an API is a Curse.
Let's Create Some API and learn about it
Lets Learn
Let's worship this
● Global state of the internet security DDoS attack reports | Akamai
● How to send API key in the header of python request? - Stack Overflow
● Postman Sending Request onto the API
● Postman Sending AUTH token
● Automating the postman Calls
● Akamai State of the Internet Report
Never treat a API like a
Web Server
Most Common term in API Testing and Hacking is
IDOR or BOLA
Can I get the document of Customer ID :1001
Of Course take it
Can I get the document of Customer ID :3001
Server 3
Server 1
Server 2
Can I get the document of Customer ID :1001
Response 200 OK
You can take the data
Can I get the document of Customer ID :3001
Server 3
Server 1
Server 2
Hacker now understand the API slang
Always Turn off the Developer Mode
API Breaches in BOLA
If a Client API manually specify an Object ID then it is potentially a BOLA
Vulnerability.
API Testing and Hacking (1).pdf
Some Postman Hacks are
GET /api/Student_ID/{marks} - To fetch the no auth Values here
POST /api/Student_ID/{marks}/add_marks - adding marks to the ID
POST /api/Student_ID/{marks}/add_grade - adding grade bypassing marks
How to FIX?
● Test API for the OWASP top 10
● Authorization should be the most emphasis in the security practice
● Hack your own API
● SAST and DAST properly
● Stop relying on the Jailbroken Device Detection

More Related Content

PPTX
OWASP Top 10 2021 What's New
PDF
Threat Modeling Basics with Examples
PDF
Hacking and Defending APIs - Red and Blue make Purple.pdf
PPT
Secure code practices
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PPTX
The Rise of Ransomware
PDF
You can detect PowerShell attacks
PPT
Source Code Analysis with SAST
OWASP Top 10 2021 What's New
Threat Modeling Basics with Examples
Hacking and Defending APIs - Red and Blue make Purple.pdf
Secure code practices
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
The Rise of Ransomware
You can detect PowerShell attacks
Source Code Analysis with SAST

What's hot (20)

PDF
Api security-testing
PDF
PDF
Ransomware: History, Analysis, & Mitigation - PDF
PPTX
Ransomware
PPT
Tor Presentation
PPTX
Stuxnet mass weopan of cyber attack
PPTX
Cyber Threat Hunting with Phirelight
PPTX
Xss attack
ODP
OWASP Secure Coding
PPTX
The Zero Trust Model of Information Security
PPTX
Rise of software supply chain attack
PPTX
Android Hacking + Pentesting
PDF
PHISHING PROTECTION
PDF
Ch 11: Hacking Wireless Networks
PPT
Internet Traffic Monitoring and Analysis
PDF
Cybersecurity - Mobile Application Security
PDF
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
PPTX
Security testing fundamentals
KEY
Enterprise Open Source Intelligence Gathering
PPTX
Understanding cyber resilience
Api security-testing
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware
Tor Presentation
Stuxnet mass weopan of cyber attack
Cyber Threat Hunting with Phirelight
Xss attack
OWASP Secure Coding
The Zero Trust Model of Information Security
Rise of software supply chain attack
Android Hacking + Pentesting
PHISHING PROTECTION
Ch 11: Hacking Wireless Networks
Internet Traffic Monitoring and Analysis
Cybersecurity - Mobile Application Security
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Security testing fundamentals
Enterprise Open Source Intelligence Gathering
Understanding cyber resilience

Similar to API Testing and Hacking (1).pdf (20)

PPTX
apidays LIVE India 2022 - The Future of API’s Security.pptx
PDF
API Summit 2021: What to know before you start dating APIs.pdf
PDF
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
PDF
CIS14: Best Practices You Must Apply to Secure Your APIs
PPTX
Outpost24 webinar - Api security
PDF
Api Testing.pdf
PDF
API testing Notes and features, difference.pdf
PDF
Modern APIs: The Non-Technical User’s Guide | The Enterprise World
PDF
APIsecure 2023 - API First Hacking, Corey Ball, Author of Hacking APIs
PPTX
Unit 3_detailed_automotiving_mobiles.pptx
PDF
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
PDF
apidays Hong Kong - Attack API Architecture, Alvin Tam, Hong Kong Computer So...
PDF
Top API Security Issues Found During POCs
PDF
Api FUNdamentals #MHA2017
PPTX
Understanding APIs-2.pptx this is a report of api
PDF
The Ultimate API Publisher's Guide
PDF
apidays New York 2023 - Putting yourself out there - how to secure your publi...
PDF
API Hijacking (1).pdf
PDF
API Hijacking.pdf
PDF
API Hijacking.pdf
apidays LIVE India 2022 - The Future of API’s Security.pptx
API Summit 2021: What to know before you start dating APIs.pdf
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
CIS14: Best Practices You Must Apply to Secure Your APIs
Outpost24 webinar - Api security
Api Testing.pdf
API testing Notes and features, difference.pdf
Modern APIs: The Non-Technical User’s Guide | The Enterprise World
APIsecure 2023 - API First Hacking, Corey Ball, Author of Hacking APIs
Unit 3_detailed_automotiving_mobiles.pptx
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
apidays Hong Kong - Attack API Architecture, Alvin Tam, Hong Kong Computer So...
Top API Security Issues Found During POCs
Api FUNdamentals #MHA2017
Understanding APIs-2.pptx this is a report of api
The Ultimate API Publisher's Guide
apidays New York 2023 - Putting yourself out there - how to secure your publi...
API Hijacking (1).pdf
API Hijacking.pdf
API Hijacking.pdf

More from Vishwas N (20)

PDF
API Testing and Hacking.pdf
PDF
What should be your approach for solving ML_CV problem statements_.pdf
PDF
Deepfence.pdf
PDF
DevOps - A Purpose for an Institution.pdf
PDF
Dapr.pdf
PDF
linkerd.pdf
PDF
HoloLens.pdf
PDF
Automated Governance for the DevOps Institutions.pdf
PDF
Lets build with DevSecOps Culture.pdf
PDF
Github Actions and Terraform.pdf
PDF
KEDA.pdf
PPTX
Ram bleed the hardware based approach for the hackers
PPTX
Container on azure
PPTX
Deeplearning and dev ops azure
PPTX
Azure data lakes
PPTX
Azure dev ops
PPTX
Azure ai on premises with docker
PPTX
Nlp for the precision medicine
PPTX
Stem cell and the other techniques
PPTX
Stem cells pros and cons
API Testing and Hacking.pdf
What should be your approach for solving ML_CV problem statements_.pdf
Deepfence.pdf
DevOps - A Purpose for an Institution.pdf
Dapr.pdf
linkerd.pdf
HoloLens.pdf
Automated Governance for the DevOps Institutions.pdf
Lets build with DevSecOps Culture.pdf
Github Actions and Terraform.pdf
KEDA.pdf
Ram bleed the hardware based approach for the hackers
Container on azure
Deeplearning and dev ops azure
Azure data lakes
Azure dev ops
Azure ai on premises with docker
Nlp for the precision medicine
Stem cell and the other techniques
Stem cells pros and cons

Recently uploaded (20)

PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Welding lecture in detail for understanding
DOCX
573137875-Attendance-Management-System-original
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Well-logging-methods_new................
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Internet of Things (IOT) - A guide to understanding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Sustainable Sites - Green Building Construction
Structs to JSON How Go Powers REST APIs.pdf
Arduino robotics embedded978-1-4302-3184-4.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
additive manufacturing of ss316l using mig welding
Welding lecture in detail for understanding
573137875-Attendance-Management-System-original
bas. eng. economics group 4 presentation 1.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Model Code of Practice - Construction Work - 21102022 .pdf
Well-logging-methods_new................
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026

API Testing and Hacking (1).pdf

  • 1. API Testing and Hacking By : Vishwas Narayan
  • 3. We Developed faster failed quicker and implemented faster(thanks to devops engineers) But we Forgot Security We worked liked machines and forgot we are human beings We have “trust” for Each other
  • 4. is a Vulnerability • Connections • Users • Content • URLs • Files in the endpoints • New files • Devices • …. Firewall AuthN AuthZ URL Filtering IDS/ IPS Anti-virus Sandboxing IoT Security Cryptography Trust issues lies everywhere
  • 5. Software is Eating the world
  • 6. Software is Eating the world Custom Code Open Source Software Infrastructure as Code Container Manifest Files Scaling Platforms Software Patches ● 80-90 percent of the code is open source ● 80% of the code is found in the Indirect Dependency ● Millions of the imports ● Agile is a Curse to Some Extent of the Development ● The Beauty of the Code is its Scalable and Reusable ● Happy Dev and Happy Bugs in the Production ● Agile is a Blessing Custom Wrappers / Frameworks
  • 7. We all built solutions? Think web 3.0
  • 8. Open Port number 22 with Web3.0 Application implemented
  • 10. What's even more Dangerous is
  • 11. Source : A6: Security Misconfiguration ❗ - Top 10 OWASP 2017 (wallarm.com)
  • 12. We have to learn how to miconfigure
  • 13. What is an API? ● API stands for Application Programming Interface. In the context of APIs, the word Application refers to any software with a distinct function. ● Interface can be thought of as a contract of service between two applications. ● This contract defines how the two communicate with each other using requests and responses. According to Wikipedia “An application programming interface is a way for two or more computer programs to communicate with each other. It is a type of software interface, offering a service to other pieces of software. A document or standard that describes how to build or use such a connection or interface is called an API specification.”
  • 14. Simple Analogy ● It's a Socket that communicates with the different services. ● Its a Source of Communication that takes the front end and connected the backend of the different services ● Its a doesn't care source that is coming in the picture its just a dumb formator of the code that needs more security ● Today's blessing of multiple language and abstraction as an API is a Curse.
  • 15. Let's Create Some API and learn about it Lets Learn
  • 16. Let's worship this ● Global state of the internet security DDoS attack reports | Akamai ● How to send API key in the header of python request? - Stack Overflow ● Postman Sending Request onto the API ● Postman Sending AUTH token ● Automating the postman Calls ● Akamai State of the Internet Report
  • 17. Never treat a API like a Web Server
  • 18. Most Common term in API Testing and Hacking is IDOR or BOLA
  • 19. Can I get the document of Customer ID :1001 Of Course take it Can I get the document of Customer ID :3001 Server 3 Server 1 Server 2
  • 20. Can I get the document of Customer ID :1001 Response 200 OK You can take the data Can I get the document of Customer ID :3001 Server 3 Server 1 Server 2
  • 21. Hacker now understand the API slang
  • 22. Always Turn off the Developer Mode
  • 23. API Breaches in BOLA If a Client API manually specify an Object ID then it is potentially a BOLA Vulnerability.
  • 25. Some Postman Hacks are GET /api/Student_ID/{marks} - To fetch the no auth Values here POST /api/Student_ID/{marks}/add_marks - adding marks to the ID POST /api/Student_ID/{marks}/add_grade - adding grade bypassing marks
  • 26. How to FIX? ● Test API for the OWASP top 10 ● Authorization should be the most emphasis in the security practice ● Hack your own API ● SAST and DAST properly ● Stop relying on the Jailbroken Device Detection