Fruits of Learning
search
⌘Ctrlk
Fruits of Learning
  • Overview
  • Tools & Cheatsheets
  • Hacking Methodology
  • Hands-on Practice
  • Changelog
  • Courses
    • 📦Hack The Box
      • spiderWeb Penetration Tester
        • Module 1: Web Requests
        • Module 2: Introduction to Web Applications
        • Module 3: Using Web Proxies
        • Module 4: Information Gathering - Web Edition
        • Module 5: Web Fuzzing
        • Module 6: JavaScript Deobfuscation
        • Module 7: Cross-Site Scripting (XSS)
        • Module 8: SQL Injection Fundamentals
        • Module 9: SQLMap Essentials
        • Module 10: Command Injections
        • Module 11: File Upload Attacks
        • Module 12: Server-Side Attacks
        • Module 13: Login Brute Forcing
        • Module 14: Broken Authentication
        • Module 15: Web Attacks
        • Module 16: File Inclusion
        • Module 17: Attacking GraphQL
        • Module 18: API Attacks
        • Module 19: Attacking Common Applications
        • Module 20: Bug Bounty Hunting Process
      • spider-black-widowSenior Web Penetration Tester
      • robotAI Red Teamer
      • swordPenetration Tester
      • staffActive Directory Penetration Tester
      • wifiWi-Fi Penetration Tester
      • chess-rookSOC Analyst
      • fireJunior Cybersecurity Analyst
    • 🕴️OffSec
    • 💸SANS
    • 🛡️Security Blue Team
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Courseschevron-right
  2. 📦Hack The Boxchevron-right
  3. spiderWeb Penetration Tester

Module 18: API Attacks

PreviousModule 17: Attacking GraphQLchevron-leftNextModule 19: Attacking Common Applicationschevron-right