“Reporting templates saved hours during bounty writeups and helped me land retainer work.”
CAPIE — Certified API Hacking Expert (2025 Edition)
The Certified API Hacking Expert (CAPIE) is a certification program focused on API security. It’s designed to be affordable and accessible for beginners while still offering value to advanced bug bounty hunters. Covers API basics, enumeration, fuzzing, authentication & authorization testing, and both OWASP API Top 10 (2019 & 2023). Includes real-world exploitation techniques and practical labs, not just theory. Comes with a 4-hour simulated exam to test your skills. Flexible format: you can get the course material (with certificate of completion), the exam voucher (certification), or a bundle with both. It’s well-reviewed, practical, and emphasizes hands-on, job-ready API hacking skills.
Launch special — refreshed materials included Secure your seat
€1.00 €1.00
or 3 monthly payments of €0.33
What's inside the new CAPIE edition
- Totally revamped exam system
- An open source API hacking tool
- Soon-to-come new labs
- Dual-track coverage of the OWASP API Top 10 (2019 & 2023).
- Scenario-based reporting, stakeholder playbooks, and exam-ready deliverable templates.
- Gateway bypass drills, practice exam machines, and on-call checklists for every engagement.
CAPIE student reviews
Real voices from engineers who now break and secure APIs with confidence.
“The CAPIE labs forced me to diagram every request and spot auth gaps clients miss.”
“Exams that mirror real engagements are worth taking because they measure what actually matters. CAPIE and CWAP made me enumerate, form hypotheses, test, and validate with real evidence. That is the same loop I use on customer systems. The result is a credential that reflects practical skill, not rote memorisation.”
“Honestly is a must for any api hacking enthusiasts, and the instructor is super helpful in the discord as well. Highly recommend this course and his other courses.”
“Great course, very informative, learning lots!”
“Very informative and to the point.”
“this course was literally soo soo nice i learned a lot . thank you for this!”
Updated CAPIE 2025 edition
In this new edition, we have to make new exam machines and come up with a nice new twist because since Shinobi.security (AI Agentic pentester) got our exam, i had to make a new one. Additionally I made a new API hacking tool which is expanded much beyond what there was before. I will be deploying new CAPIE labs in the near future so stay tuned..!
Chapter 1 · Introduction to APIs
In today’s hyperconnected world, software applications rarely operate alone. They depend on Application Programming Interfaces (APIs) to exchange data, orchestrate workflows, and deliver seamless user experiences. This chapter explains what APIs are, why they matter, and how the two most common web styles—SOAP and REST—compare.
What is an API?
An API is a contract that defines the rules, protocols, and data formats that allow one software component to interact with another. Web APIs typically communicate over HTTP, enabling mobile apps, web services, and integrations to request data or trigger actions across distributed systems.
Why are APIs important?
APIs power modular architectures, accelerate development by reusing services, and enable third-party integrations. They also expand the attack surface if they are not secured properly, which is why this certification couples functionality with security throughout the syllabus.
SOAP vs. REST
SOAP is a strict protocol that uses XML envelopes and can be stateful, making it popular in enterprise environments. REST is an architectural style that leverages HTTP verbs and is typically stateless, often using JSON for payloads.
Aspect | SOAP | REST |
---|---|---|
Protocol | Strict protocol | Architectural style |
State | Can be stateful | Typically stateless |
Message format | XML | JSON (commonly) |
Error handling | <soap:Fault> | HTTP status codes |
Complexity | More “heavyweight” | Generally simpler |
Use cases | Legacy or enterprise apps | Modern web or mobile apps |
SOAP example
<soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope">
<soap:Body>
<m:GetStockPrice xmlns:m="http://www.example.org/stock">
<m:StockName>GOOG</m:StockName>
</m:GetStockPrice>
</soap:Body>
</soap:Envelope>
REST example
POST /stocks
{
"stock": "AAPL",
"price": "145.00"
}
API authentication & authorization
Learn how APIs validate and authorize callers using methods such as Basic Auth, API keys, Bearer tokens, OAuth 2.0, JSON Web Tokens (JWT), OpenID Connect, and both role-based (RBAC) and attribute-based (ABAC) access controls. We examine rate limiting, token leakage, man-in-the-middle threats, and IDOR risks to show how security decisions influence exposure.
API architectures
Explore monoliths vs. microservices, API gateways, serverless platforms, GraphQL schemas, stateful vs. stateless design, versioning strategies, and the importance of logging, monitoring, and documentation. Each topic highlights how architecture and governance choices affect security posture.
Documentation matters
Strong documentation drives safer integrations. We cover the critical components of good docs, the role of OpenAPI and Swagger, Postman collections, common documentation pitfalls, and how transparency balances with security expectations.
Chapter 2 · Tools to interact with an API
Master the tooling landscape used by pentesters, QA teams, and developers to exercise APIs. This chapter focuses on four core toolsets: cURL, Postman, SOAP UI, and Python.
cURL
Discover why cURL is the command-line workhorse for crafting HTTP requests, manipulating headers, handling authentication, and transferring files. You will practise GET and POST requests, custom headers, data formats, redirects, verbose output, cookies, and file operations.
Postman
Use Postman’s graphical interface to organise requests into collections, manage environments, collaborate with teams, automate tests with pre-request scripts and Newman, and simulate APIs with mock servers.
SOAP UI
Build SOAP and REST projects, import WSDLs, create assertions, run data-driven tests, extend functionality with Groovy scripts, and stand up mock services to mirror production behaviour for deeper validation.
Python
Employ Python’s requests
library for automation, including authenticated requests, JSON handling,
query parameters, exception handling, file transfers, and session management. Learn where scripting fits in
automation, integration, data processing, and testing workflows.
Chapter 3 · The OWASP API Top 10 — 2019
Examine the 2019 OWASP API Security Top 10, understanding how each risk manifests, how to test for it, and how to remediate it. Real-world examples accompany every category.
- Broken Object Level Authorization: Identify BOLA conditions by enumerating object identifiers and enforcing server-side checks.
- Broken User Authentication: Evaluate password policies, session management, and MFA expectations.
- Excessive Data Exposure: Spot over-shared fields in responses and implement output filtering.
- Lack of Resource & Rate Limiting: Detect DoS or brute-force gaps and configure throttling.
- Broken Function Level Authorization: Prevent privilege escalation by validating roles and permissions on every endpoint.
- Mass Assignment: Guard against auto-binding vulnerabilities by whitelisting properties and using DTOs.
- Security Misconfiguration: Harden platforms by removing defaults, locking down services, and sanitising errors.
- Injection: Apply parameterisation and sanitisation to block SQL, NoSQL, and command injections.
- Improper Assets Management: Track and retire deprecated or test endpoints before attackers find them.
- Insufficient Logging & Monitoring: Instrument APIs so anomalies trigger alerts and evidence is preserved.
Chapter 4 · The OWASP API Top 10 — 2023
Update your threat models with the 2023 list of OWASP API risks. Learn what changed, how attackers exploit each weakness, and the mitigation controls modern platforms demand.
- BOLA: Revisit object-level authorization in multi-tenant and service-to-service contexts.
- Broken Authentication: Reinforce credential hygiene, token lifecycles, and adaptive MFA.
- Broken Object Property Level Authorization: Prevent property-level tampering and mass assignment.
- Unrestricted Resource Consumption: Enforce rate limits, payload size checks, and concurrency ceilings.
- Broken Function Level Authorization: Lock down privileged operations across orchestration layers.
- Unrestricted Access to Sensitive Business Flows: Protect high-impact endpoints with additional verification.
- Server-Side Request Forgery: Contain SSRF by validating outbound destinations and segmenting networks.
- Security Misconfiguration: Automate drift detection and apply least privilege in every environment.
- Improper Inventory Management: Maintain API inventories so deprecated services do not linger.
- Unsafe Consumption of APIs: Treat upstream services as untrusted, validating and sanitising responses.
Chapter 5 · API Pentesting Documentation
Pentesting success relies on thorough planning, reporting, and collaboration. This chapter covers the Test Plan, Test Report, and Test Debrief Meeting in depth.
Test Plan
Learn how to define scope, objectives, methodologies, and logistics. We explore NDA handling, documentation intake, and aligning on grey-box strategies using OWASP guidance.
Test Report
Build executive summaries, methodology narratives, detailed findings, and remediation recommendations. Sample structures illustrate how to present evidence for vulnerabilities like SQL injection, XSS, and IDOR.
Test Debrief Meeting
Facilitate debriefs that engage pentesters, developers, security teams, and stakeholders. The agenda emphasizes remediation timelines, lessons learned, and next steps.
Chapter 6 · API Firewalls – Essentials, Installation, and Bypass Techniques
Understand how API firewalls act as a specialised shield for web services, how to deploy them responsibly, and how ethical bypass testing strengthens defenses.
Essentials
Define API firewalls, their role in filtering malicious traffic, and the threats they address, from injection to broken authentication.
Installation
Compare deployment models (reverse proxy, sidecar/service mesh, inline appliance), configure rules, schema validation, rate limiting, authentication checks, and logging, then verify protections through testing.
Ethical bypass techniques
Review authorised testing tactics—input evasion, HTTP verb tampering, header manipulation, request smuggling—and the mitigations that keep defences resilient.
Chapter XTRA 001 · HTTP Request Methods
Build fluency in HTTP verbs—the foundation of RESTful design. We cover semantics, safety, idempotence, and best practices for methods such as GET, POST, PUT, PATCH, DELETE, HEAD, and OPTIONS.
- GET: Safe and idempotent retrieval of resources.
- POST: Non-idempotent creation or server-side processing.
- PUT: Idempotent replacement or creation of resources.
- PATCH: Partial updates, idempotent when designed carefully.
- DELETE: Idempotent removal of resources.
- HEAD & OPTIONS: Discover resource metadata and communication capabilities.
Additional coverage includes CONNECT, TRACE, WebDAV extensions, and guidance on choosing the right method, managing caching, payload size, and security controls like CSRF protection.
Chapter XTRA 002 · CVSS Scoring and Calculation
Learn the Common Vulnerability Scoring System (CVSS) v3.1 to communicate risk objectively. We break down Base, Temporal, and Environmental metrics, explain the formulas, and walk through a scoring example.
Understand exploitability metrics (Attack Vector, Attack Complexity, Privileges Required, User Interaction, Scope) and impact metrics (Confidentiality, Integrity, Availability). Then apply Temporal and Environmental adjustments to tailor scores to real-world contexts.
A worked SQL injection example demonstrates calculating Base, Temporal, and Environmental scores, reinforcing best practices like documenting assumptions, recomputing scores as conditions change, and leveraging official calculators.
CAPIE frequently asked questions
Answers about the CAPIE study experience and exam readiness.