API Attacks
OWASP API Security Top 10 (2023)
Risk
Description
API Recon & Enumeration
Swagger/OpenAPI Discovery
/swagger
/swagger-ui
/swagger-ui.html
/api-docs
/v1/api-docs
/v2/api-docs
/openapi.jsonCommon API Paths
Enumerate Your User Info
Enumerate All Users/Resources
Check API Versions (Improper Inventory)
BOLA / IDOR (API1)
Identification
Mass BOLA Abuse with Bash Loop
ffuf IDOR Enumeration
Bypassing Encoded/Hashed References
IDOR via Information Disclosure Chain
Broken Authentication (API2)
Identification
Password Brute Force with ffuf
Security Question Brute Force
Broken Object Property Level Authorization (API3)
Identification - Excessive Data Exposure
Identification - Mass Assignment
Common Mass Assignment Fields
Test Mass Assignment
Unrestricted Resource Consumption (API4)
Identification
Generate Large File for Upload DoS
Test File Upload Abuse
BFLA (API5)
Identification
Test All Privileged Endpoints
SSRF (API7)
Identification
File URI Scheme SSRF
Common SSRF Payloads
Retrieve SSRF Results
SQL Injection (API8)
Identification
Test Payloads
API SQLi Payloads
Improper Inventory Management (API9)
Identification
Check for Old API Versions
Common Legacy Paths
JWT Manipulation
Decode JWT
JWT None Algorithm Attack
JWT Key Confusion
Useful Tools
jq Examples
Real Challenge Examples
Security Question Brute Force (API2)
SSRF via Profile URI Update (API7)
BOLA Mass Enumeration (API1)
Last updated