There are many ways to perform API interception. This whitepaper outlines the five most common techniques, including:
- Inline hooking
- Callbacks
- Import table rewriting
- Method rewriting
- Web API Intercept
and details strengths and weaknesses of each approach. This paper also reviews how Deepfactor, a developer security platform, has used API interception for the purposes of providing engineering teams with contextual application security insights.