🖥
API Hacking - RESTful API
API consumer can request resources
API Endpoints : from API endpoints, which is a URL for
example.com/api/3/users interacting with part of API
example.com/api/v3/customers
example.com/api/users
example.com/users
Collection: a group of
resources such as
Acronym CRUD
/api/profiles/users Stands for Create, Read, Update and
Delete
Subcollection: Create a process of making new
req. accomplished through POST
refers to collection within a particular
method
resource
Read data retrieval, through GET
/api/users/{user_id}/settings req.
Update: record modification through
POST OR PUT overwritten
Delete: Erasing record through
Delete or POST
Gateway: 6 Constraint
filters bad request Restful API depends on 6 Constants,
monitor incoming traffic Rest is essentially a set of guidelines
for an HTTP resource-based
route each req. to proper service or
architecture.
microservice
API Hacking - RESTful API 1
it also handles security controls Uniform Interface: RestAPI Should
such as authentication, encryption have a uniform interface, the req.
in transit using ssl, rate limit, load devices should not matter. All be
balancing able to access server in same way
Client/ Server: RestAPI Should
Microservices:
have client/ Server architecture,
Modular piece of web app that handles client are consumer of req. info.
a specific function while server are provider of that
💡
info.
API Doc. might user colon or Stateless: RestAPI should not
square bracket or curly require stateful communication
bracket
Cacheable: Response from Rest
/api/v2/:customer_id or
API Provider should indicate
/api/v2/[customer_id] or
weather the response is cacheable
/api/v2/{customer_id}
Layered System: Client should be
able to req. data from endpoint
Standard web API Types without knowing about the
Restful API: underlying server architecture
Rest stands for representation state Code on Demand (Optional): Allows
transfer for code to be send to the client for
it is set of Architectural constrant execution
that defines how web shoulid work
designed to improve upon
inefficiencies of other older APIs,
such as SOAP API
Rest API Primiarly user the HTTP
method GET, POST, PUT &
DELETE to accomplish CRUD
API Hacking - RESTful API 2