ATTACK TECHNIQUES
API Attack Techniques
Common attack techniques targeting APIs — how they work, how to detect them, and how to defend against them.
38 Attack Techniques
Adversarial Input Attack Api Abuse Attack Api Key Enumeration Attack Api Scraping Attack Api Version Exploitation Attack Brute Force Attack Cache Poisoning Attack Credential Stuffing Attack Deserialization Attack Attack Dns Rebinding Attack Graphql Batching Attack Graphql Introspection Abuse Attack Idor Enumeration Attack Jwt Cracking Attack Jwt None Algorithm Attack Llm Jailbreaking Attack Mass Assignment Exploit Attack Model Inversion Attack Nosql Injection Attack Open Redirect Chain Attack Parameter Tampering Attack Password Spraying Attack Privilege Escalation Attack Prompt Injection Direct Attack Prompt Injection Indirect Attack Race Condition Exploit Attack Rate Limit Bypass Attack Request Smuggling Attack Session Hijacking Attack Sql Injection Blind Attack Sql Injection Union Attack Ssrf Blind Attack Ssrf Cloud Metadata Attack Token Replay Attack Training Data Extraction Attack Webhook Spoofing Attack Xml Bomb Attack Xxe Oob Attack