--- name: detecting-api-enumeration-attacks description: Detect and prevent API enumeration attacks including BOLA and IDOR exploitation by monitoring sequential identifier access patterns and authorization failures. domain: cybersecurity subdomain: api-security tags: - api-security - enumeration - bola - idor - broken-object-level-authorization - owasp-api-top-10 - access-control - rate-limiting version: '1.0' author: mahipal license: Apache-2.0 nist_csf: - PR.PS-01 - ID.RA-01 - PR.DS-10 - DE.CM-01 --- # Detecting API Enumeration Attacks ## Overview API enumeration attacks occur when attackers systematically probe API endpoints with sequential or predictable identifiers to discover and access unauthorized resources. Broken Object Level Authorization (BOLA), ranked as API1:2023 in the OWASP API Security Top 10, is the most critical API vulnerability. Attackers manipulate object identifiers (user IDs, order numbers, account references) in API requests to bypass authorization and access other users' data. Detection requires monitoring for patterns of rapid sequential access attempts, authorization failures, and abnormal API usage behavior. ## When to Use - When investigating security incidents that require detecting api enumeration attacks - When building detection rules or threat hunting queries for this domain - When SOC analysts need structured procedures for this analysis type - When validating security monitoring coverage for related attack techniques ## Prerequisites - API gateway or reverse proxy with logging enabled (Kong, AWS API Gateway, Apigee) - SIEM platform (Splunk, Elastic SIEM, or Microsoft Sentinel) - Access to API server logs with request details - Web Application Firewall (WAF) with API protection capabilities - Understanding of the API's authorization model and object identifier schemes ## Attack Patterns to Detect ### 1. Sequential ID Enumeration Attackers iterate through numeric or predictable identifiers: ``` GET /api/v1/users/1001 -> 200 OK GET /api/v1/users/1002 -> 200 OK GET /api/v1/users/1003 -> 403 Forbidden GET /api/v1/users/1004 -> 200 OK GET /api/v1/users/1005 -> 200 OK ... ``` **Detection Indicators:** - Rapid sequential requests to the same endpoint with incrementing IDs - Mix of 200/403/401 responses from same source - Request rate exceeding normal user behavior - Access to resources outside authenticated user's scope ### 2. UUID/GUID Enumeration Even non-sequential identifiers can be enumerated if leaked through other endpoints: ``` # Attacker first harvests UUIDs from a list endpoint GET /api/v1/posts?page=1 -> Returns post objects with author UUIDs # Then uses those UUIDs to access restricted user data GET /api/v1/users/a3f2c1e4-... -> Private user profile GET /api/v1/users/b7d9e8f1-... -> Private user profile ``` ### 3. Parameter Tampering Enumeration ``` # Authenticated as user_id=100, attempting to access other users' orders GET /api/v1/orders?user_id=101 GET /api/v1/orders?user_id=102 GET /api/v1/orders?user_id=103 ``` ## Detection Rules ### Splunk Detection Queries ```spl # Detect sequential ID enumeration on API endpoints index=api_logs sourcetype=api_access | rex field=uri_path "(?/api/v\d+/\w+/)(?\d+)" | stats count as request_count, dc(object_id) as unique_ids, values(status_code) as status_codes, min(_time) as first_seen, max(_time) as last_seen by src_ip, endpoint, user_session | eval time_span = last_seen - first_seen | eval requests_per_second = request_count / max(time_span, 1) | where unique_ids > 20 AND requests_per_second > 2 | eval severity = case( unique_ids > 100, "critical", unique_ids > 50, "high", unique_ids > 20, "medium", 1==1, "low" ) | sort - unique_ids | table src_ip, endpoint, unique_ids, request_count, requests_per_second, status_codes, severity # Detect BOLA via authorization failure patterns index=api_logs sourcetype=api_access status_code IN (401, 403) | bin _time span=5m | stats count as failure_count, dc(uri_path) as unique_paths, values(uri_path) as attempted_paths by _time, src_ip, user_id | where failure_count > 10 | eval attack_type = if(unique_paths > 5, "enumeration", "brute_force") ``` ### Elastic SIEM Detection Rules ```json { "rule": { "name": "API Object Enumeration Detection", "description": "Detects rapid sequential access to API objects with mixed authorization results", "type": "threshold", "index": ["api-access-*"], "query": { "bool": { "must": [ { "regexp": { "url.path": "/api/v[0-9]+/[a-z]+/[0-9]+" } } ], "should": [ { "term": { "http.response.status_code": 200 } }, { "term": { "http.response.status_code": 403 } }, { "term": { "http.response.status_code": 401 } } ] } }, "threshold": { "field": ["source.ip"], "value": 50, "cardinality": [ { "field": "url.path", "value": 20 } ] }, "schedule": { "interval": "5m" }, "severity": "high", "risk_score": 73, "tags": ["OWASP-API1", "BOLA", "Enumeration"] } } ``` ### Custom Detection Script ```python #!/usr/bin/env python3 """API Enumeration Attack Detector Analyzes API access logs to detect enumeration patterns including BOLA, IDOR, and sequential ID probing. """ import re import sys import json from collections import defaultdict from datetime import datetime, timedelta from dataclasses import dataclass, field from typing import List, Dict, Optional @dataclass class AccessRecord: timestamp: datetime source_ip: str user_id: Optional[str] method: str path: str status_code: int object_id: Optional[str] = None @dataclass class EnumerationAlert: source_ip: str user_id: Optional[str] endpoint_pattern: str unique_object_ids: int total_requests: int time_window_seconds: float requests_per_second: float auth_failure_ratio: float severity: str attack_type: str sample_ids: List[str] = field(default_factory=list) class EnumerationDetector: # Regex patterns for extracting object IDs from API paths ID_PATTERNS = [ re.compile(r'/api/v\d+/(\w+)/(\d+)'), # Numeric IDs re.compile(r'/api/v\d+/(\w+)/([a-f0-9\-]{36})'), # UUIDs re.compile(r'/api/v\d+/(\w+)/([a-zA-Z0-9]{20,})'), # Long alphanumeric IDs ] def __init__(self, time_window_minutes: int = 5, min_unique_ids: int = 15, max_requests_per_second: float = 5.0): self.time_window = timedelta(minutes=time_window_minutes) self.min_unique_ids = min_unique_ids self.max_rps = max_requests_per_second self.access_log: List[AccessRecord] = [] def parse_log_line(self, line: str) -> Optional[AccessRecord]: """Parse a common log format line into an AccessRecord.""" log_pattern = re.compile( r'(?P[\d.]+)\s+\S+\s+(?P\S+)\s+' r'\[(?P