2

Setting Up the Penetration Testing Environment

Continuing with the first part of our book, this is one of the most practical chapters. It’s obviously impossible to conduct a high quality pentest without the necessary toolbelt. We discuss some possibilities here along with some utilities that will help you on your daily API pentesting life. You will find instructions to install all major tools I applied to build the exercises, which are the same tools you will use in real API intrusion tests. There are also a couple of decisions that you need to make regarding the operating system and the Integrated Development Environment (IDE) to adopt. You can save some considerable time by cloning the book’s repository. I shared all codes that are present ...

Get Pentesting APIs now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.