🐼
Hacking APIs
Ctrlk
  • How web application works?
  • The Anatomy of Web API
  • API Insecurities
  • Setting up an API hacking system
  • API Targets
  • Discovering APIs
  • Endpoint analysis
  • Vulnerabilities
  • Attacking API auth
  • Fuzzing
  • Exploiting API Auth
    • BOLA (Broken Object Level Authorization)
    • BFLA (Broken Function Level Authorization)
  • Exploting Mass Assignment
  • API Injection
  • AWS
  • Writeups
  • Misc
  • Tools
  • Resources
  • Wordpress API
  • Prevention
Powered by GitBook
On this page

Exploiting API Auth

BOLA (Broken Object Level Authorization)BFLA (Broken Function Level Authorization)
PreviousFuzzing Wide and DeepNextBOLA (Broken Object Level Authorization)