Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Research Library

The top resource for free research, white papers, reports, case studies, magazines, and eBooks.

Share Your Content with Us
on TradePub.com for readers like you. LEARN MORE
The 5 Most Common API Interception Techniques

Request Your Free White Paper Now:

"The 5 Most Common API Interception Techniques"

The Strengths and Weaknesses of Each Approach Is Reviewed and Recommendations Provided

There are many ways to perform API interception. This white paper outlines the five most common techniques, including:

  • Inline hooking
  • Callbacks
  • Import table rewriting
  • Method rewriting
  • Web API Intercept

and details strengths and weaknesses of each approach. This paper also reviews how Deepfactor, a developer security platform, has used API interception to provide engineering teams with contextual application security insights.


Offered Free by: Deepfactor
See All Resources from: Deepfactor

Recommended for Professionals Like You: