Endpoint Analysis Flashcards

1
Q

In which situation is performing reverse engineering necessary?

A

When you don’t have an API documentation or if it isn’t available for you. Then you’ll have to create your own collection of endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When reverse engineering an api, how should you use the app?

A

I should use the app as intended, but in a meticulously manner to capture every functionality detail and make a better map of the attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which flag must be added to improve the api swagger documentation created by the mitmproxy2swagger command?

A

–examples

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or false: Although the documentation created is useful, you won’t be able to find any vulnerabilities yet

A

False. It’s possible to find some vulnerabilities, like an information disclosure in a response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it important to look for the “overview” section of an API documentation?

A

The overview section contains high-level information about how to connect to the api and how to use it. It also could contain information about authentication and rate-limit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why it’s important to review an API documentation?

A

To look for functionalities and actions that you can take. To note request’s requirements such as form of authentication, parameters, path variables, headers and body.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When excessive data exposure occurs?

A

When an API sends a full data object as a response, typically to be filtered by the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the EDE, the amount of data sent by the API matters?

A

Although the response size can indicate this vulnerability, it’s not about the amount of data, it’s more about the sensitivity of the sent data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a response that has an EDE usually contain?

A

More information than it was requested and sensitive data that could be leveraged into a more complex attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly