Deranged0tter's Notes
GitHubWrite Ups
  • What is This?
  • 💻Hacking Methodology
    • Penetration Testing Overview
    • Penetration Testing Process
      • Pre-Engagement
      • Information Gathering
    • Tunneling
    • Upgrading Shells
    • Exfiltration
  • 🪟Windows Hacking
    • Windows OS Details
    • Windows System Enumeration
    • Data Mining Windows
    • Active Directory
      • Initial Attack Vectors
      • Post-Compromise Enumeration
      • Post Compromise Attacks
    • Windows (Re)Configuration
    • Persistence on Windows
    • Windows Privilege Escalation
    • Windows Scripting
    • Windows Post Exploitation
    • Useful Windows Commands
    • Defending Windows
    • Windows Registry Location & Settings
    • Windows Tips & Tricks
  • 🐧Linux Hacking
    • Linux OS Details
    • Linux System Enumeration
    • Linux File Manipulation
    • Linux Persistence
    • Linux Scripting
    • Linux Post Exploitation
    • Linux Tools
    • Linux Useful Commands
    • Defending Linux
    • Linux Tips & Tricks
  • 🕸️Web Hacking
    • Web Enumeration
    • SQL Injection
    • Authentication
    • Path Traversal
    • Command Injection
    • Access Control
    • File Uploads
    • Server-Side Request Forgery (SSRF)
    • Information Disclosure
    • Access Controls
    • XXE Injection
    • Cross-Site Scripting (XSS)
    • Cross-Site Request Forgery (CSRF)
    • Clickjacking
    • DOM-Based Vulnerabilties
    • WebSockets
    • Insecure Deserialization
    • GraphQL API Vulnerabilities
    • Server-Side Template Injection
    • Web Cache Poisoning
    • HTTP Host Header Attacks
    • HTTP Request Smuggling
    • OAuth Authentication
    • JWT Attacks
    • Prototype Pollution
    • JavaScript Deobjuscation
  • ⚙️API Hacking
    • API Enumeration
    • Endpoint Analysis
    • Scanning APIs
    • API Authentication Attacks
    • Exploiting API Authorization
    • Improper Assets Management
    • Excessive Data Exposure
    • Mass Assignment
    • API Server-Side Request Forgery
    • API Injection Attacks
    • Evasion & Combining Techniques
  • 📱Mobile Hacking
    • IOS
    • Android
  • 🌪️Wireless Hacking
    • Deauth Attack
    • Cracking WPA2 Passwords
  • 🛠️Tools
    • Nmap
    • Ffuf
    • Sqlmap
    • Burpsuite
    • Zap
  • 📜Cheat Sheets
    • Nmap Cheat Sheet
    • SQLMap Cheat Sheet
  • 🔎OSINT
    • Sock Puppets
    • Search Engine OSINT
    • Image OSINT
    • Email OSINT
    • Password OSINT
    • Username OSINT
    • People OSINT
    • Social Media OSINT (SOCMINT)
    • Website OSINT
    • Business OSINT
    • Wireless OSINT
    • Working with OSINT Tools
    • OSINT Automation
  • 🌳Resources
    • Liability
    • Resources
    • Inspiration
Powered by GitBook
On this page
  1. ⚙️API Hacking

API Authentication Attacks

PreviousScanning APIsNextExploiting API Authorization