Source: securityboulevard.com – Author: Dana Epp
The folks over at Packt Publishing sent me a gift recently. It was a copy of one of their latest books, Pentesting APIs: A practical guide to discovering, fingerprinting, and exploiting APIs.
Oh, how fun. I love seeing more books published on the topic of API security testing. While Packt Publishing gave me this book, they know that my opinions and any review are my own.
So let’s take a look at it, shall we?
Author Background
I don’t know Maurício Harley. We’ve never crossed paths before, probably because he lives and breathes IT and appsec across the pond over in France. I know he works as a Senior Software Engineer for RedHat, focusing on their OpenStack Security, and contributes to OWASP over there.
You can read his bio on Amazon or check out his LinkedIn profile here.
I can say from reading past articles he has written along with this book, that he clearly has enough war wounds to be able to share his experiences.
Let’s look at his API pentesting book in more depth and see what he shares.
Content Overview and Key Topics
We will start by reviewing the structure of the book.
The book is about 260 pages long but includes a lot of screenshots that are hard to see in print form. I would imagine the Kindle or PDF versions look much better than print in this regard.
It is organized into five parts. These include:
- Introduction to API Security
- Understanding APIs and their Security Landscape
- Setting up the Penetration Testing Environment
- API Information Gathering and AuthN/AuthZ Testing
- API Reconnaissance and Information Gathering
- Authentication and Authorization Testing
- API Basic Attacks
- Injection Attacks and Validation Testing
- Error Handling and Exception Testing
- Denial of Service and Rate-Limiting Testing
- API Advanced Topics
- Data Exposure and Sensitive Information Leakage
- API Abuse and Business Logic Testing
- API Security Best Practices
- Secure Coding Practices for APIs
It’s an interesting structure. From recon and information gathering to basic attack testing, with a smidge of secure coding guidance for good measure.
The last bit didn’t really fit for me. It’s odd and out of place. While I respect Maurício’s position that we should be looking at how to prevent attacks as well, I don’t think that’s the place of an API pentester. This final part of the book could have been better focused on how to communicate the weaknesses in the code (like I talk about here) to developers, and provide guidance for remediation that way.
With the structure articulated, let me tell you what I thought about the book.
My thoughts on the book
I want to start by saying everyone has their own methodology based on learned experiences. So, that leaves me with the need to express the caveat that my lived experiences are different from Maurício. We choose different tools and ways to attack APIs. And our views on what it means to pentest an API differ.
I am not saying his approach is wrong. But it feels incomplete to me.
Honestly, I had mixed feelings about this book as I read it. It “felt” rushed, with some areas completely glanced over, while others went far too deep in setting something up that doesn’t materially teach us anything of value.
We don’t need over a dozen pages to show how to set up Open Bullet for credential stuffing, only to miss spending any time discussing how to extract common API artifacts and OpenAPI documentation metadata to help map areas to attack.
Original Post URL: https://securityboulevard.com/2024/11/is-the-latest-book-on-pentesting-apis-any-good/
Category & Tags: Security Bloggers Network,API Hacking Fundamentals – Security Bloggers Network,API Hacking Fundamentals
Views: 0