
API Penetration Testing Services for REST, GraphQL & OAuth
Most API vulnerabilities aren’t found by scanners. Broken object-level authorization, JWT forgery, and mass assignment flaws require manual exploitation across authenticated sessions, the kind of work automated tools consistently miss.
Pentest Testing Corp delivers manual-led API penetration testing covering the full OWASP API Security Top 10, with findings mapped to developer-ready remediation steps. Our engagements are led by certified API Security for PCI Compliance and Ethical Hacker professionals with hands-on experience across SaaS, fintech, and healthcare API environments.
Engagements start from $5,000. View full pricing →
What We Test: Endpoints, Auth Flows & Authorization Logic
We test REST and GraphQL APIs across all authenticated roles and unauthenticated attack surfaces. Scope is defined by endpoint count, authorization depth, and integration complexity, not by a fixed checklist.
Authentication & Token Security
- JWT signature validation, algorithm confusion attacks (RS256 → HS256 downgrade), and token expiry enforcement
- OAuth 2.0 authorization code flow abuse, implicit flow weaknesses, state parameter bypass, and refresh token misuse
- Session tokens that survive logout, role changes, or password resets
Authorization Flaws: BOLA & BFLA
- Broken Object Level Authorization (BOLA): Can User A access, modify, or delete User B’s records by substituting object identifiers in API calls? We test this across every resource type, orders, invoices, documents, user profiles.
- Broken Function Level Authorization (BFLA): Can a standard user invoke admin-only endpoints, trigger batch operations, or call destructive functions the UI doesn’t expose? We enumerate every HTTP method and undocumented path.
Mass Assignment & Parameter Tampering
- Identifying writable fields that should be read-only:
is_admin,account_balance,role,plan_tier - Fuzzing JSON body parameters with Burp Suite to uncover fields the API accepts but documentation doesn’t mention
Rate Limiting & Abuse Controls
- Rate-limit bypass via IP rotation, header spoofing (
X-Forwarded-For,X-Real-IP), and request fragmentation - OTP brute force windows, credential stuffing exposure, and unauthenticated enumeration loops on account discovery endpoints
SSRF via API Calls
- Server-Side Request Forgery through webhook registration URLs, image import fields, and metadata fetch endpoints
- SSRF probing to internal cloud metadata services (AWS IMDSv1, GCP metadata server, Azure IMDS) to test for IAM credential exposure
Injection & Excessive Data Exposure
- NoSQL injection, SQL injection via API query parameters, and command injection through file-upload or processing endpoints
- Endpoints returning full object payloads when only partial data is required, a common API3:2023 finding that leaks PII at scale
GraphQL-Specific Testing
- Introspection abuse and schema enumeration in production environments
- Query depth attacks and batching abuse that circumvent per-request rate limits
- Authorization gaps in nested resolvers and mutations that don’t inherit top-level auth checks
Real-World Attack Scenarios We Simulate
These reflect actual vulnerability patterns found across live SaaS, fintech, and healthcare API engagements, not hypothetical test cases.
Scenario 1 – BOLA Leading to Cross-Tenant Data Access: An attacker registers an account, intercepts aGET /api/v1/users/{id}/documentsrequest, and increments theidvalue. If authorization checks only validate that a token is present, not that the token owns the requested object, the API returns another tenant’s documents. We’ve found this in multi-tenant SaaS platforms where object-level checks were applied inconsistently across endpoints. See how this appeared in a real engagement →
Scenario 2 – JWT Algorithm Confusion: APIs that accept both RS256 and HS256 tokens are vulnerable to a well-documented attack: take the RSA public key, use it as the HMAC secret, and sign a forged token. If the API’s validation library uses the algorithm field from the token header rather than enforcing it server-side, the forged token passes. We verify this using Burp Suite’s JWT Editor extension and custom Postman payloads.
Scenario 3 – SSRF via Webhook to Internal Cloud Metadata: A webhook registration endpoint accepts a user-supplied callback URL with no egress filtering. We point it athttp://169.254.169.254/latest/meta-data/iam/security-credentials/and retrieve temporary AWS IAM credentials in the response body. This surfaces regularly in payment notification services, import tools, and third-party integration endpoints.
Scenario 4 – Mass Assignment on Subscription Upgrade: AnPATCH /profile/updateendpoint accepts an arbitrary JSON body. We add"plan": "enterprise"and"is_verified": trueto a standard account request. If the ORM doesn’t explicitly whitelist accepted fields, the database writes them. We’ve used this to self-upgrade accounts on billing APIs, no payment required.
How We Conduct the Test
We begin with endpoint discovery using imported Postman collections, OpenAPI/Swagger specs, and passive traffic analysis through Burp Suite’s proxy. Authentication flows are mapped across every defined user role before active testing starts. Manual testing follows OWASP API Security Top 10 sequentially, with additional attack chaining to identify multi-step exploitation paths that single-check tools miss. Every finding is reproduced, CVSS-scored by exploitability and business impact, and documented with a verbatim proof-of-concept request/response pair.
Compliance Mapping: PCI DSS, SOC 2, HIPAA & ISO 27001
API penetration testing isn’t just a security best practice; for regulated industries, it’s a documented requirement.
PCI DSS v4.0
Requirement 11.3.1 mandates penetration testing of all in-scope system components, including API layers that process or transmit cardholder data. Requirement 6.2.4 requires that software development practices actively prevent injection attacks, broken authentication, and authorization failures. Our reports are structured to satisfy both requirements directly. View our PCI DSS advisory services →
SOC 2 Type II
CC6.1 (logical access controls) and CC7.1 (threat detection and monitoring) both benefit from documented API penetration testing evidence. SOC 2 auditors increasingly ask for proof that authorization testing, specifically BOLA coverage, has been conducted by an independent third party.
HIPAA
APIs handling Protected Health Information (PHI) must satisfy the Security Rule’s technical safeguard requirements around access control, audit logging, and integrity. An API pentest produces the third-party validation evidence that demonstrates due diligence to auditors and business associates.
ISO 27001
Annex A.8.8 (management of technical vulnerabilities) and A.8.29 (security testing in development and acceptance) directly require what this engagement delivers: independent security testing of API surfaces with documented, prioritized remediation guidance.
What You Receive
Every engagement includes:
- Executive summary written for non-technical stakeholders, CTO, CISO, Board, that communicates risk in business terms, not CVE IDs
- Technical findings report with per-vulnerability entries: description, CVSS v3.1 score, reproduction steps, proof-of-concept request/response, and a developer-ready remediation recommendation
- OWASP API Security Top 10 coverage matrix mapping tested items to the standard, directly referenceable by auditors
- Prioritized remediation list with critical and high-severity issues flagged for immediate action, with medium and low items contextualized by real exploitability
- Raw evidence package including Burp Suite project files and Postman collections, available on request for internal review or your development team
Free Retest Included
Once your team has remediated the findings, we retest every critical and high-severity vulnerability at no additional charge within the agreed retest window. You receive written confirmation that the issue is closed — useful for compliance auditors, enterprise customers requiring vendor evidence, and internal sign-off processes.
Frequently Asked Questions about API Penetration Testing Services
Ready to Test Your API?
Send us your API collection, and we’ll scope the engagement within 24 hours.