Let's build an API to hack - Part 1: The basics

Let's build an API to hack - Part 2: Faking it before breaking it

Let's build an API to hack - Part 3: Information disclosure

Let's build an API to hack - Part 4: Business logic flaw

Let's build an API to hack - Part 5: Emulating wonky login systems to get broken authentication issues and injection flaws

API roulette - Name the issues