Hidden API Functionality Exposure
Application programming interfaces (APIs) have become a critical part of almost every business. APIs are responsible for transferring information between systems within a company or to external companies. For example, when you log in to a website like Google or Facebook, an API processes your login credentials to verify they are correct.
Swagger UI Documentation
Dictionary Attack | Brute force
Common wordlist for API Enum :
https://wordlists.assetnote.io/
https://github.com/Net-hunter121/API-Wordlist
Steps to Perform This Attack :
Note: There will be minimum limits per request which will be assigned without API keys so make sure to utilize manual approach as much as you can, then the rest can be automated for scanning the vulnerability in API with automated tools.
Contributor:
Last updated