profile

😈 The API Hacker Inner Circle

πŸ—“οΈ The API Hackers' Year in Review - 2024 πŸŽ„πŸ₯³


Happy New Year! πŸŽ‰

I trust you had a great holiday season and brought in the New Year with a bang.

2024 has been an interesting year. Anyone else feel that way?

Over the holidays I have been catching up on reading and just finished Offensive Security Using Python. It's a hands-on guide to help build custom pentesting and red team tools using Python, along with tooling for threat detection and incident response.

I found the book tries to cover too much, and doesn't go into enough depth into any one area. I would have rather seen it go deeper into stealthy exploits and backdoors to automating recon and post-exploitation tasks in more detail. Offensive security tactics and threat detection to me should be in two separate books.

But I guess I'm a bit biases since my attitude has always been about appsec through offsec.

There are some good tidbits of Python code that still makes the book worth reading though.

Reading is learning. And we should always be learning. Speaking of which, since it's our year end review, let's take a look at the top 10 articles I wrote in 2024.


Top Ten Articles in 2024

Last year many of you in the community appreciated learning what the most popular articles were in 2023. I thought it might be fun to do that again in this year's review.

I will of course exclude the How to get started as an API hacker since that covers the beginners guide and what not that everyone gets pointed to when they first start out.

Here are the top articles I wrote in 2024 that the community has been reading the most:

1️⃣ Attacking APIs using JSON Injection​

2️⃣ Is Bruno a good Postman alternative for API hacking?​

3️⃣ Detecting Uncommon Headers in an API using Burp Bambda Filters​

4️⃣ Hacking Modern Android Mobile Apps & APIs with Burp Suite​​

5️⃣ Discovering API secrets & endpoints using APKLeaks​

6️⃣ Reverse Engineering Electron Apps to Discover APIs​

7️⃣ Is Nuclei any good for API hacking?​

8️⃣ Detecting API endpoints and source code with JS Miner​

9️⃣ Exploiting an API with Structured Format Injection​

πŸ”Ÿ Fuzzing JSON to find API security flaws​

With over 45 articles written last year, it was interesting to see what was most popular. I would have thought articles like How to find hidden API parameters would have ranked higher.

But hey, you know what you like!


Industry News

πŸ› οΈ Have you checked out Vacuum yet? They boast that it's the fastest OpenAPI and Swagger linter and quality analysis tool out there for APIs. Do you agree?

πŸ€” How Many APIs Does the Average Enterprise Have? Kin Lane completed an interesting analysis on the subject. My gut tells me regardless of the size of the company, no one really knows what's REALLY out there. So many zombie and shadow APIs out there that get forgotten about.

πŸ““ Now this surprised me... In Cloudflare's Year in Review for 2024 they call out that "Go" is the most popular language choice for automated API clients. Node.js came in a close second, with Python following up right behind.

πŸ€– It's being reported that a new study finds that a quarter of all respondents have encountered AI-enhanced security threats related to APIs or LLMs, and 75% are expressing serious concern about AI-enhanced attacks in the future.

🀯 Speaking of AI-enhanced attacking, have you checked out Burpference yet? This is a new Burp extension that captures HTTP requests and responses in Burp Suite and sends it off to a remote LLM API in JSON format to run inference to see if any potential vulnerabilities exists in the request/response. Hacking apps and APIs with AI. Gotta love it.

βš™οΈ Are you using WAFW00F? It's a great tool to identify and fingerprint Web Application Firewalls (WAF) protecting an API. They just released an update recently. I like looking at the Git changelog via release tags to notice new WAFs they are detecting.

πŸ” Apparently over 300,000 Prometheus instances have been exposed due to API keys leaking online. According to the researchers, "Unauthenticated Prometheus servers enable direct querying of internal data, potentially exposing secrets that attackers can exploit to gain an initial foothold in various organizations". *groan*

πŸ” Gotta Mc-Love it. A security researcher in India exploited the McDonald's Delivery API to hijack deliveries and order food for a penny. The writeup includes some decent details on how he approached the attack. Gives an entirely new meaning to "would you like fries with that?".

☠️ Earlier this year when I wrote about testing Bruno out as a replacement for Postman, people thought I was daft. I mentioned back then that I thought it was a terrible idea of having cloud-based workspaces for my sensitive security work as I could just see things leaking. I was right. The folks over at CloudSEK have published some details about their year-long investigation that revealed over 30,000 publicly accessible Postman workspaces leaking sensitive information, including API keys, business data and customer PII.


Well, that's about it for 2024. Enjoyed the annual review? Have an idea for an article you think I should write in 2025? Hit the "reply" button and let me know.

In the meantime, let's tackle those APIs in 2025!

Hack hard!
Dana

How was this week's newsletter?


YOU DID GREAT

DO BETTER

ABOUT

You're reading the API Hackers Inner Circle Newsletter created by Dana Epp (he/him).

🧠 I help teach developers, testers, and hackers how to improve their API hacking tradecraft. Thanks for reading. πŸ™

⏩ Enjoy the newsletter? Please forward this to a friend who would find these articles and insights useful!

πŸ‘‹ Did a pal share this with you? Sign up for your own copy here. I send out the newsletter every Tuesday.

​

β˜•οΈ Want to support this free newsletter and my work? Buy me a coffee.

🀯 Want some expert advice? Book a 1:1 session with me.

​

Is this newsletter not right for you? You can unsubscribe here.

😈 The API Hacker Inner Circle

Helping developers, testers, and hackers improve their approach to appsec and find vulnerabilities in their apps and APIs before their adversaries do. Interested to know more? Subscribe to my newsletter below!

Share this page