Already a member?
Your cart

Your cart is empty.

The Cheese Shop / 014: CAPIE - Certified API Hacking Expert (2025 edition)

CAPIE emblem

CAPIE — Certified API Hacking Expert (2025 Edition)

The Certified API Hacking Expert (CAPIE) is a certification program focused on API security. It’s designed to be affordable and accessible for beginners while still offering value to advanced bug bounty hunters. Covers API basics, enumeration, fuzzing, authentication & authorization testing, and both OWASP API Top 10 (2019 & 2023). Includes real-world exploitation techniques and practical labs, not just theory. Comes with a 4-hour simulated exam to test your skills. Flexible format: you can get the course material (with certificate of completion), the exam voucher (certification), or a bundle with both. It’s well-reviewed, practical, and emphasizes hands-on, job-ready API hacking skills.

Promotional price

Launch special — refreshed materials included Secure your seat

€1.00 €1.00

or 3 monthly payments of €0.33

Promotion ends in 24 October 2025 at 01:00 CEST
Enroll in CAPIE

What's inside the new CAPIE edition

  • Totally revamped exam system
  • An open source API hacking tool
  • Soon-to-come new labs
  • Dual-track coverage of the OWASP API Top 10 (2019 & 2023).
  • Scenario-based reporting, stakeholder playbooks, and exam-ready deliverable templates.
  • Gateway bypass drills, practice exam machines, and on-call checklists for every engagement.

CAPIE student reviews

Real voices from engineers who now break and secure APIs with confidence.

“Reporting templates saved hours during bounty writeups and helped me land retainer work.”
WebhookWren Freelance bug hunter
“The CAPIE labs forced me to diagram every request and spot auth gaps clients miss.”
PacketBadger Staff API pentester
“Exams that mirror real engagements are worth taking because they measure what actually matters. CAPIE and CWAP made me enumerate, form hypotheses, test, and validate with real evidence. That is the same loop I use on customer systems. The result is a credential that reflects practical skill, not rote memorisation.”
Shinobi AI agentic AI web and API penetration tester
“Honestly is a must for any api hacking enthusiasts, and the instructor is super helpful in the discord as well. Highly recommend this course and his other courses.”
Petros T.
“Great course, very informative, learning lots!”
Fecklewick
“Very informative and to the point.”
Jason J.
“this course was literally soo soo nice i learned a lot . thank you for this!”
Krish P.

Updated CAPIE 2025 edition

In this new edition, we have to make new exam machines and come up with a nice new twist because since Shinobi.security (AI Agentic pentester) got our exam, i had to make a new one. Additionally I made a new API hacking tool which is expanded much beyond what there was before. I will be deploying new CAPIE labs in the near future so stay tuned..!

Chapter 1 · Introduction to APIs

In today’s hyperconnected world, software applications rarely operate alone. They depend on Application Programming Interfaces (APIs) to exchange data, orchestrate workflows, and deliver seamless user experiences. This chapter explains what APIs are, why they matter, and how the two most common web styles—SOAP and REST—compare.

What is an API?

An API is a contract that defines the rules, protocols, and data formats that allow one software component to interact with another. Web APIs typically communicate over HTTP, enabling mobile apps, web services, and integrations to request data or trigger actions across distributed systems.

Why are APIs important?

APIs power modular architectures, accelerate development by reusing services, and enable third-party integrations. They also expand the attack surface if they are not secured properly, which is why this certification couples functionality with security throughout the syllabus.

SOAP vs. REST

SOAP is a strict protocol that uses XML envelopes and can be stateful, making it popular in enterprise environments. REST is an architectural style that leverages HTTP verbs and is typically stateless, often using JSON for payloads.

Aspect SOAP REST
ProtocolStrict protocolArchitectural style
StateCan be statefulTypically stateless
Message formatXMLJSON (commonly)
Error handling<soap:Fault>HTTP status codes
ComplexityMore “heavyweight”Generally simpler
Use casesLegacy or enterprise appsModern web or mobile apps

SOAP example

<soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope">
  <soap:Body>
    <m:GetStockPrice xmlns:m="http://www.example.org/stock">
      <m:StockName>GOOG</m:StockName>
    </m:GetStockPrice>
  </soap:Body>
</soap:Envelope>

REST example

POST /stocks
{
  "stock": "AAPL",
  "price": "145.00"
}

API authentication & authorization

Learn how APIs validate and authorize callers using methods such as Basic Auth, API keys, Bearer tokens, OAuth 2.0, JSON Web Tokens (JWT), OpenID Connect, and both role-based (RBAC) and attribute-based (ABAC) access controls. We examine rate limiting, token leakage, man-in-the-middle threats, and IDOR risks to show how security decisions influence exposure.

API architectures

Explore monoliths vs. microservices, API gateways, serverless platforms, GraphQL schemas, stateful vs. stateless design, versioning strategies, and the importance of logging, monitoring, and documentation. Each topic highlights how architecture and governance choices affect security posture.

Documentation matters

Strong documentation drives safer integrations. We cover the critical components of good docs, the role of OpenAPI and Swagger, Postman collections, common documentation pitfalls, and how transparency balances with security expectations.

Chapter 2 · Tools to interact with an API

Master the tooling landscape used by pentesters, QA teams, and developers to exercise APIs. This chapter focuses on four core toolsets: cURL, Postman, SOAP UI, and Python.

cURL

Discover why cURL is the command-line workhorse for crafting HTTP requests, manipulating headers, handling authentication, and transferring files. You will practise GET and POST requests, custom headers, data formats, redirects, verbose output, cookies, and file operations.

Postman

Use Postman’s graphical interface to organise requests into collections, manage environments, collaborate with teams, automate tests with pre-request scripts and Newman, and simulate APIs with mock servers.

SOAP UI

Build SOAP and REST projects, import WSDLs, create assertions, run data-driven tests, extend functionality with Groovy scripts, and stand up mock services to mirror production behaviour for deeper validation.

Python

Employ Python’s requests library for automation, including authenticated requests, JSON handling, query parameters, exception handling, file transfers, and session management. Learn where scripting fits in automation, integration, data processing, and testing workflows.

Chapter 3 · The OWASP API Top 10 — 2019

Examine the 2019 OWASP API Security Top 10, understanding how each risk manifests, how to test for it, and how to remediate it. Real-world examples accompany every category.

  1. Broken Object Level Authorization: Identify BOLA conditions by enumerating object identifiers and enforcing server-side checks.
  2. Broken User Authentication: Evaluate password policies, session management, and MFA expectations.
  3. Excessive Data Exposure: Spot over-shared fields in responses and implement output filtering.
  4. Lack of Resource & Rate Limiting: Detect DoS or brute-force gaps and configure throttling.
  5. Broken Function Level Authorization: Prevent privilege escalation by validating roles and permissions on every endpoint.
  6. Mass Assignment: Guard against auto-binding vulnerabilities by whitelisting properties and using DTOs.
  7. Security Misconfiguration: Harden platforms by removing defaults, locking down services, and sanitising errors.
  8. Injection: Apply parameterisation and sanitisation to block SQL, NoSQL, and command injections.
  9. Improper Assets Management: Track and retire deprecated or test endpoints before attackers find them.
  10. Insufficient Logging & Monitoring: Instrument APIs so anomalies trigger alerts and evidence is preserved.
Chapter 4 · The OWASP API Top 10 — 2023

Update your threat models with the 2023 list of OWASP API risks. Learn what changed, how attackers exploit each weakness, and the mitigation controls modern platforms demand.

  1. BOLA: Revisit object-level authorization in multi-tenant and service-to-service contexts.
  2. Broken Authentication: Reinforce credential hygiene, token lifecycles, and adaptive MFA.
  3. Broken Object Property Level Authorization: Prevent property-level tampering and mass assignment.
  4. Unrestricted Resource Consumption: Enforce rate limits, payload size checks, and concurrency ceilings.
  5. Broken Function Level Authorization: Lock down privileged operations across orchestration layers.
  6. Unrestricted Access to Sensitive Business Flows: Protect high-impact endpoints with additional verification.
  7. Server-Side Request Forgery: Contain SSRF by validating outbound destinations and segmenting networks.
  8. Security Misconfiguration: Automate drift detection and apply least privilege in every environment.
  9. Improper Inventory Management: Maintain API inventories so deprecated services do not linger.
  10. Unsafe Consumption of APIs: Treat upstream services as untrusted, validating and sanitising responses.
Chapter 5 · API Pentesting Documentation

Pentesting success relies on thorough planning, reporting, and collaboration. This chapter covers the Test Plan, Test Report, and Test Debrief Meeting in depth.

Test Plan

Learn how to define scope, objectives, methodologies, and logistics. We explore NDA handling, documentation intake, and aligning on grey-box strategies using OWASP guidance.

Test Report

Build executive summaries, methodology narratives, detailed findings, and remediation recommendations. Sample structures illustrate how to present evidence for vulnerabilities like SQL injection, XSS, and IDOR.

Test Debrief Meeting

Facilitate debriefs that engage pentesters, developers, security teams, and stakeholders. The agenda emphasizes remediation timelines, lessons learned, and next steps.

Chapter 6 · API Firewalls – Essentials, Installation, and Bypass Techniques

Understand how API firewalls act as a specialised shield for web services, how to deploy them responsibly, and how ethical bypass testing strengthens defenses.

Essentials

Define API firewalls, their role in filtering malicious traffic, and the threats they address, from injection to broken authentication.

Installation

Compare deployment models (reverse proxy, sidecar/service mesh, inline appliance), configure rules, schema validation, rate limiting, authentication checks, and logging, then verify protections through testing.

Ethical bypass techniques

Review authorised testing tactics—input evasion, HTTP verb tampering, header manipulation, request smuggling—and the mitigations that keep defences resilient.

Chapter XTRA 001 · HTTP Request Methods

Build fluency in HTTP verbs—the foundation of RESTful design. We cover semantics, safety, idempotence, and best practices for methods such as GET, POST, PUT, PATCH, DELETE, HEAD, and OPTIONS.

  • GET: Safe and idempotent retrieval of resources.
  • POST: Non-idempotent creation or server-side processing.
  • PUT: Idempotent replacement or creation of resources.
  • PATCH: Partial updates, idempotent when designed carefully.
  • DELETE: Idempotent removal of resources.
  • HEAD & OPTIONS: Discover resource metadata and communication capabilities.

Additional coverage includes CONNECT, TRACE, WebDAV extensions, and guidance on choosing the right method, managing caching, payload size, and security controls like CSRF protection.

Chapter XTRA 002 · CVSS Scoring and Calculation

Learn the Common Vulnerability Scoring System (CVSS) v3.1 to communicate risk objectively. We break down Base, Temporal, and Environmental metrics, explain the formulas, and walk through a scoring example.

Understand exploitability metrics (Attack Vector, Attack Complexity, Privileges Required, User Interaction, Scope) and impact metrics (Confidentiality, Integrity, Availability). Then apply Temporal and Environmental adjustments to tailor scores to real-world contexts.

A worked SQL injection example demonstrates calculating Base, Temporal, and Environmental scores, reinforcing best practices like documenting assumptions, recomputing scores as conditions change, and leveraging official calculators.

Where young ratlings scamper next

CAPIE unlocks deeper client work, and many graduates aim their whiskers at CNWPP or CWAP for the next climb. Choose the path that best matches your squad’s ambitions and stack.

CAPIE frequently asked questions

Answers about the CAPIE study experience and exam readiness.

The CAPIE course focuses on lesson material, labs, and assignments. You will receive a certificate of completion when you finish, and that certificate is required to purchase the separate CAPIE exam voucher.

CAPIE ships with streaming lessons, downloadable workbooks, assignments, and practice labs that cover the OWASP API Top 10 (2019 and 2023), API documentation, pentesting deliverables, and practice exam machines.

Use the signature labs, guided exercises, and the practice exam machines included in the course to rehearse attacks and reporting. Students typically revisit the OWASP API modules and the pentesting documentation section to fine-tune their exam readiness.

CAPIE teaches API basics, enumeration, fuzzing, authentication/authorization, OWASP API Top 10 (2019 & 2023), and real-world exploitation. It emphasizes applied, job-ready skills over theory.

CAPIE certification is a lifetime credential. However, staying sharp through practice and keeping up with API security trends is recommended.

Yes. CAPIE is designed to be affordable and accessible, while still providing value to advanced bug bounty hunters. Labs scale in complexity so you can learn progressively.

Stay ahead of the next CAPIE drops