❓Excercises⚙️Let's build an API to hack - Part 1: The basics⚙️Let's build an API to hack - Part 2: Faking it before breaking it⚙️Let's build an API to hack - Part 3: Information disclosure⚙️Let's build an API to hack - Part 4: Business logic flaw⚙️Let's build an API to hack - Part 5: Emulating wonky login systems to get broken authentication issues and injection flaws🎲API roulette - Name the issues