1. Tell me the owasp top -10 vulnerability list of API of 2023?
2. Which process do you follow to test the API ?
3. What is the difference between REST and SOAP API ?
4. What is the Bearer token in API ?
5. On which method you will get the authorization token in API ?
6. What is Broken Object Level Authorization (BOLA)?
7. How will you exploit BOLA ?
8. What are the impacts and mitigations in BOLA ?
9. What is Broken Authentication ?
10. Tell me the test scenarios of Broken Authentication ?
11. What are the impact and remediations in Broken Authentication ?
12. What is Broken Object Property Level Authorization ?
13. What are the defences of broken object property level authorization ?
14. What is unrestricted resource consumption ?
15. What are the impacts of unrestricted resource consumption ?
16. What is Broken Function level Authorization ?
17. What is the Difference between BOLA , BOPLA and BFLA ?
18. What are the testing scenarios of unrestricted resource consumption ?
19. What is Unrestricted access to sensitive business Flows explain with example ?
20. What are the remediations of Unrestricted access to sensitive business Flows ?
21. Can SSRF be tested on API ?
22. What are the Payloads of SSRF ?
23. What are impacts of SSRF ?
24. How to test Security Misconfiguration in API ?
25. What Is Improper Inventory Management ?
26. What is Unsafe Consumption of API ?
27. What are the examples of unsafe consumption of API’s ?
28. What are the mitigations of Unsafe consumption of API’s ?
29. How to Perform CRLF injection on API ?
30. What is CORS Header?