10

Using Evasion Techniques

Evasion techniques are strategies employed by malicious actors to circumvent or avoid detection and countermeasures put in place to secure APIs. These techniques are designed to make it challenging for security systems to identify, analyze, or prevent unauthorized access, data breaches, or other malicious activities conducted through APIs. Evasion techniques can encompass a range of methods, including obfuscation to conceal the true nature of code or communication, encoding and encryption to hide information from traditional inspection methods, steganography to embed malicious content within seemingly innocuous API traffic, and polymorphism to dynamically alter the appearance of APIs to evade recognition.

This chapter ...

Get API Security for White Hat Hackers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.