From the course: CompTIA PenTest (PT0-002) Cert Prep

Unlock this course with a free trial

Join today to access over 23,200 courses taught by industry experts.

API attacks and attack resources

API attacks and attack resources

- As most IT infrastructures move more and more towards a distributed environment where there's all kinds of remote services being invoked, we see more and more risk associated with that architecture. So, let's take a quick look at some of the API mechanisms that are commonly used to transport requests and data back and forth to invoke remote functionality. An API is an application programming interface. Basically what it means, it allows one client, typically a remote client to invoke functionality that used to be just embedded inside a software application. It doesn't have to be remote, it can be local, but we're using a lot of remote APIs to invoke remote functionality, and to transfer data back and forth. The cloud applications use this all the time, as well as any distributed application. So, let's look at some vulnerabilities with API and what kind of attacks we can use for APIs. Let's take a look at several of the most common technologies that are used, or really, several of…

Contents