接口安全
API特征分类
SOAP
打开就是这样

在url后面添加?wsdl访问

OpenApi-Swagger

RESTful
特征是有版本体现

例如v1这种
测试SOAP(postman联合burp和xary)
url后面加入/?WSDL访问源数据

全选复制后导入postman

开启代理到burp

burp开启代理,指向xary

开启xary
xRay.exe webscan --listen 127.0.0.1:8888 --html-output 111.html

点击运行


测试openapi-swagger
工具下载:https://github.com/jayus0821/swagger-hack
python swagger-hack2.0.py -u http://116.203.153.217:8180/api.json

打开结果文件swagger.csv

可以根据状态码和返回信息决定要不要手工测试