🐼
Hacking APIs
search
Ctrlk
  • How web application works?
  • The Anatomy of Web API
  • API Insecurities
  • Setting up an API hacking system
  • API Targets
  • Discovering APIschevron-right
  • Endpoint analysis
  • Vulnerabilitieschevron-right
  • Attacking API authchevron-right
  • Fuzzingchevron-right
  • Exploiting API Authchevron-right
    • BOLA (Broken Object Level Authorization)
    • BFLA (Broken Function Level Authorization)
  • Exploting Mass Assignmentchevron-right
  • API Injectionchevron-right
  • AWS
  • Writeupschevron-right
  • Miscchevron-right
  • Toolschevron-right
  • Resources
  • Wordpress APIchevron-right
  • Prevention
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Exploiting API Auth

BOLA (Broken Object Level Authorization)chevron-rightBFLA (Broken Function Level Authorization)chevron-right
PreviousFuzzing Wide and Deepchevron-leftNextBOLA (Broken Object Level Authorization)chevron-right