Testimonials
C-AI/MLPen
C-AI/MLPen
C-AI/MLPen
C-AI/MLPen
What is the Certified API Pentester (C-APIPen) exam?
The Certified API Pentester (C-APIPen) exam is an intermediate-level exam designed to test a candidate’s understanding of fundamental API security concepts. Candidates must be able to demonstrate practical knowledge to conduct an API pentest to pass this exam.
Who should take this exam?
C-APIPen is intended to be taken by pentesters, application security architects, SOC analysts, red and blue team members and any security enthusiasts, who want to evaluate and advance their knowledge.
What is the format of the exam?
C-APIPen is an intense 4 hour long practical exam. It requires candidates to solve a number of challenges, identify and exploit various vulnerabilities and obtain flags. The exam can be taken online, anytime (on-demand) and from anywhere. Candidates will need to connect to the exam VPN server to access the vulnerable applications.
What are the pass criteria for the exam?
The pass criteria are as follows:
- Candidates scoring over 60% marks will be deemed to have successfully passed the exam.
- Candidates scoring over 75% marks will be deemed to have passed with merit.
What is the experience needed to take the exam?
This is an intermediate-level exam. Candidates should have prior knowledge and experience of API pentesting. They should have an understanding of common API security-related topics such as the OWASP Top 10 API Security Risks, commonly identified security misconfigurations, and best security practices. They should be able to demonstrate their practical knowledge of API pentesting by completing a series of tasks on identifying and exploiting vulnerabilities that have been created in the exam environment to mimic real-world scenarios.
Note: As this is an intermediate-level exam, a minimum of two years of professional pentesting/bug-bounty experience is recommended.
What will the candidates get?
On completing the exam, each candidate will receive:
- A certificate with their pass/fail and merit status.
- The certificate will contain a certificate number, which can be used by anyone to validate the certificate.
What is the exam retake policy?
Candidates, who fail the exam, are allowed 1 free exam retake within the exam fees.
What are the benefits of this exam?
The certificate will allow candidates to demonstrate their understanding of API security topics. This will help them to advance in their career.
How long is the certificate valid for?
The certificate does not have an expiration date. However, the passing certificate will mention the details of the exam such as the exam version and the date. As the exam is updated over time, candidates should retake the newer version as per their convenience.
Will you provide any training that can be taken prior to the exams?
Being an independent certifying authority, we (The SecOps Group) do not provide any training for the exam. Candidates should carefully go over each topic listed in the syllabus and make sure they have adequate understanding, required experience and practical knowledge of these topics. Further, the following independent resources can be utilised to prepare for the exams.
Company | Free/Paid |
---|---|
Portswiggery | Free |
Kontra | Free |
TryHackMe | Paid |
HackTheBox | Free/Paid |
Pentesterlab | Free/Paid |
OWASP | Free |
Node API Goat | Free |
Rest API Goat | Free |
Vulnapi | Free |
Vapi | Free |
SQLI-Labs | Free |
Exam Syllabus
The exam will cover the following topics
Using Swagger files to view and interact with API definitions
Import and manage API collections in Postman
Identification and Exploitation of OWASP API Security Top 10 Vulnerabilities
XML External Entity attack
Server Side Template Injection (SSTI)
Server-Side Request Forgery (SSRF)
Injection Attacks
- SQL Injection
- NoSQL Injection
- Code & Command Injection
Authentication related Vulnerabilities
- Brute force attacks and password spraying
- Password reset attacks
Authorization and Session Management related flaws –
- Insecure Direct Object Reference (IDOR)
- Parameter Manipulation attacks
- JWT related attacks
Insecure File Uploads
Business Logic Flaws
Directory Traversal Vulnerabilities
Mass Assignment and Rate Limiting related Vulnerabilities
API Enumeration and Fuzzing using scripts
Web Service Description Language (WSDL) Attacks
XML Injection in REST/SOAP APIs
GraphQL Attacks
Bypassing CORS Restrictions
BCommon Security Misconfigurations
Security Best Practices and Hardening Mechanisms
Sample Question?
- Evaluate the application’s anti-reversing checks. Which of the following statements is true in the context of the Jailbreak Detection?
-
- The Application has a robust Jailbreak Detection implementation.
- The Application lacks any Jailbreak Detection implementation.
- The Application has insufficient Jailbreak Detection, which can be bypassed.
- The Application has implemented Jailbreak Detection, and it can not be bypassed.
Prerequisites:
Host Operating System:
Windows/Linux/MacOS with minimum 8GB RAM (MacOS Preferred).
Physical Device with Minimum iOS Version Supported:
iOS 14 or higher (Jailbroken).
Note: Please make sure you have your iOS pentesting environment ready (Jailbroken Physical Device, Burp Suite, or any similar proxy tool along with Frida, objection and other similar pentesting tools) prior to starting the exam. The IPA build will be distributed via TestFlight.