API Attacks

Test NameAPI IDDescriptionDetectable Vulnerabilities
AWS S3 Takeoveramazon_s3_takeoverTests for S3 buckets that no longer exist to prevent data breaches and malware distributionAmazon AWS S3 bucket takeover
Broken JWT AuthenticationjwtTests for secure implementation of JSON Web Token (JWT) in the applicationBroken JWT Authentication
Broken Object Property AuthorizationboplaTests if the application properly enforces access controls on individual properties of an objectBroken Object Property Authorization
Broken SAML Authenticationbroken_saml_authTests for secure implementation of SAML authentication in the applicationBroken SAML Authentication
Business Constraint Bypassbusiness_constraint_bypassTests if the limitation of the number of retrievable items via an API call is configured properlyBusiness Constraint Bypass
Cookie Securitycookie_securityTests if the application uses and implements cookies with secure attributesMissing 'httponly' Flag in CookieMissing 'secure' Flag in CookiePredictable Cookie Value
Date Manipulationdate_manipulationTests if date ranges are set and validated properlyUnvalidated Date Range
Directory Listingdirectory_listingTests if server-side directory listing is possibleDirectory Listing
Email Injectionemail_injectionTests if it is possible to send emails to other addresses through the target application mailing server, which can lead to spam and phishingEmail Header Injection
Excessive Data Exposureexcessive_data_exposureTests application for not screening sensitive information on the server sideExcessive Data Exposure
File Uploadfile_uploadTests if file upload mechanisms are validated properly and denies upload of malicious contentUnrestricted File Upload
Full Path Disclosure (FPD)full_path_disclosureTests if various application parameters are vulnerable to the exposure of errors that include full webroot pathFull Path Disclosure
GraphQL Introspectiongraphql_introspectionGraphQL data availability test for queries coming from external IP-addressGraphQL introspection
Headers Security Checkheader_securityTests for proper Security Headers configurationMisconfigured Security Headers
HTML Injectionhtml_injectionTests if various application parameters are vulnerable to HTML injectionHTML Injection
HTTP Method Fuzzerhttp_method_fuzzingTests enumeration of possible HTTP methods for vulnerabilitiesInsecure HTTP Method
ID Enumeration (BOLA)id_enumerationTests if it is possible to collect valid user ID data by interacting with the target applicationID Enumeration
Improper Assets Managementimproper_asset_managementTests if older or development versions of API endpoints are exposed and can be used to get unauthorized access to data and privilegesImproper Assets Management
Insecure TLS Configurationinsecure_tls_configurationTests SSL/TLS ciphers and configurations for vulnerabilitiesInsecure TLS Configuration
LDAP InjectionldapiTests if various application parameters are vulnerable to unauthorized LDAP accessLDAP Error
Local File Inclusion (LFI)lfiTests if various application parameters are vulnerable to loading of unauthorized local system resourcesLocal File Inclusion (LFI)
MongoDB InjectionnosqlTests if an attacker is able to inject malicious input into a NoSQL database queryMongoDB Injection (NoSQLI injection)
Open Cloud Storageopen_cloud_storageContains Open Buckets, Azure Blob Storage, and Amazon S3 Bucket Takeover testsOpen Cloud Storage
Open DataBaseopen_databaseTests if exposed database connection strings are open to public connectionsExposed Database AccessExposed Database Connection String
OS Command InjectionosiTests if various application parameters are vulnerable to Operation System (OS) command injectionOS Command Injection
Remote File Inclusion (RFI)rfiTests if various application parameters are vulnerable to loading of unauthorized remote system resourcesRemote File Inclusion (RFI)
Secret Tokenssecret_tokensTests for exposure of secret API tokens or keys in the target applicationSecret Tokens Leak
Server Side Template Injection (SSTI)sstiTests if various application parameters are vulnerable to server-side code executionServer Side Template Injection (SSTI)
Server-Side JavaScript Injectionserver_side_js_injectionTest if the application incorrectly evaluates user-controllable data as code on the server side.
Server-Side Request Forgery (SSRF)ssrfTests if various application parameters are vulnerable to internal resource accessServer Side Request Forgery (SSRF)
SQL Injection (SQLI)sqliSQL Injection tests vulnerable parameters for SQL database accessDatabase Error Message DisclosureSQL Injection
Version Control Systemversion_control_systemsTests if it is possible to access Version Control System (VCS) resourcesVersion Control System Exposure
XPath InjectionxpathiTests if unvalidated user input in XPath expressions can be exploited to manipulate queries, potentially leading to unauthorized access or unintended actionsXPath Injection