- Main
- Computers - Security
- Hacking APIs: Breaking Web Application...
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. BallКолко ви харесва тази книга?
Какво е качеството на файла?
Изтеглете книгата за оценка на качеството
Какво е качеството на изтеглените файлове?
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.
Hacking APIs is a crash course on web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.
You’ll learn how REST and GraphQL APIs work in the wild and set up a streamlined API testing lab with Burp Suite and Postman. Then you’ll master tools useful for reconnaissance, endpoint analysis, and fuzzing, such as Kiterunner and OWASP Amass. Next, you’ll learn to perform common attacks, like those targeting an API’s authentication mechanisms and the injection vulnerabilities commonly found in web applications. You’ll also learn techniques for bypassing protections against these attacks.
In the book’s nine guided labs, which target intentionally vulnerable APIs, you’ll practice:
• Enumerating APIs users and endpoints using fuzzing techniques
• Using Postman to discover an excessive data exposure vulnerability
• Performing a JSON Web Token attack against an API authentication process
• Combining multiple API attack techniques to perform a NoSQL injection
• Attacking a GraphQL API to uncover a broken object level authorization vulnerability
By the end of the book, you’ll be prepared to uncover those high-payout API bugs other hackers aren’t finding and improve the security of applications on the web.
Hacking APIs is a crash course on web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.
You’ll learn how REST and GraphQL APIs work in the wild and set up a streamlined API testing lab with Burp Suite and Postman. Then you’ll master tools useful for reconnaissance, endpoint analysis, and fuzzing, such as Kiterunner and OWASP Amass. Next, you’ll learn to perform common attacks, like those targeting an API’s authentication mechanisms and the injection vulnerabilities commonly found in web applications. You’ll also learn techniques for bypassing protections against these attacks.
In the book’s nine guided labs, which target intentionally vulnerable APIs, you’ll practice:
• Enumerating APIs users and endpoints using fuzzing techniques
• Using Postman to discover an excessive data exposure vulnerability
• Performing a JSON Web Token attack against an API authentication process
• Combining multiple API attack techniques to perform a NoSQL injection
• Attacking a GraphQL API to uncover a broken object level authorization vulnerability
By the end of the book, you’ll be prepared to uncover those high-payout API bugs other hackers aren’t finding and improve the security of applications on the web.
Категории:
Година:
2022
Издание:
Early Access
Издателство:
No Starch Press
Език:
english
Страници:
353
ISBN 13:
9781718502444
Файл:
PDF, 39.44 MB
Вашите тагове:
IPFS:
CID , CID Blake2b
english, 2022
Четете Онлайн
- Изтегляне
- pdf 39.44 MB Current page
- Checking other formats...
- Преобразуване в
- Деблокирайте конвертирането на файлове, по-големи от 8 MBPremium
Искате ли да добавите книжарница? Свържете се с нас на support@z-lib.do
Файлът ще бъде изпратен на вашия имейл адрес. Може да отнеме до 1-5 минути, преди да го получите.
В рамките на 1-5 минути файлът ще бъде доставен във вашия акаунт в Telegram.
Внимание: Уверете се, че сте свързали акаунта си с бота Z-Library Telegram.
В рамките на 1-5 минути файлът ще бъде доставен на вашето Kindle устройство.
Моля, обърнете внимание: трябва да потвърдите всяка книга, която искате да изпратите на вашия Kindle. Проверете пощенската си кутия за имейла за потвърждение от Amazon Kindle.
Преобразуването в се извършва
Преобразуването в е неуспешно
Предимства на премиум статус
- Изпращане на електронни четци
- Увеличен лимит за изтегляне
- Конвертиране на файлове
- Още резултати от търсенето
- Други предимства