BookingSync Case Study: API Pentest for Personal Data Protection

Client:
BookingSync — a French platform for short-term rental property management
Industry:
Software Development
Focus:
Protecting personal data of users interacting via web portal and API
Main challenge:
Assessing the security of API endpoints to prevent data leaks and unauthorized access
Market:
International (primarily Europe)
Services provided:
Gray-box API pentest using Burp Suite API Scan and manual testing methods
Key Takeaways
  • Conducted a gray-box pentest of API endpoints
  • Identified several low-level vulnerabilities
  • Delivered a report with security enhancement recommendations
  • Reduced the risk of data leaks and avoided reputational damage
  • 100%
    compliance with API security best practices
    3+
    low-level vulnerabilities identified and mitigated
    3
    weeks total duration of the testing process
    BookingSync Case Study: API Pentest for Personal Data Protection
    Is API expansion always safe for a platform? The international company BookingSync decided not to take any chances and initiated an audit of its API endpoints. The Datami team performed a gray-box pentest and uncovered low-level vulnerabilities. The resulting recommendations helped BookingSync boost its API protection and reduce the risk of data leaks.

    BookingSync is a French technology company that provides a platform for managing short-term rental properties. Serving an international market—primarily across Europe—BookingSync enables thousands of hosts and guests to access its services daily through a user-friendly web portal and API integrations.

    While the company does not operate in a regulated industry, it handles large volumes of user personal data, making robust system security a top priority.

    Objectives and challenges

    BookingSync's primary concerns were unauthorized access to its API and potential data leaks. To proactively mitigate reputational risks, the company initiated a scheduled security assessment.

    Project objective was to identify potential vulnerabilities in API endpoints and assess their resilience against external threats.

     
    • 1. Conduct a gray-box pentest of the current API endpoints.
    • 2. Detect vulnerabilities that could lead to data compromise and evaluate the overall security posture.
    • 3. Deliver a comprehensive report with actionable recommendations for improving API documentation and planning future security testing.
    icon
    Penetration testing
    Gray-box pentest of API endpoints
    icon
    Vulnerability identification
    Discovery and prioritization of security risks
    icon
    Reporting & recommendations
    Detailed report with practical advice for improving security
    Our approach

    To assess the security of BookingSync’s API endpoints, Datami employed a gray-box penetration testing approach. The team had partial access to technical documentation, enabling a deeper analysis of endpoint logic and common access scenarios.

    We combined automated scans using Burp Suite API Scan with manual testing methods to ensure thorough coverage of both standard and unconventional attack vectors.

     

     

    Gray-box
    Gray-box
    The assessment was performed with limited internal knowledge, simulating the actions of a potential attacker with basic access and insight. This approach provided a realistic view of actual risk exposure.
     
    Key stages and solutions

    The Datami team conducted a focused security assessment of BookingSync’s API, targeting vulnerabilities that could potentially lead to personal data exposure. A hybrid approach was used, combining automated scanning via Burp Suite API Scan with manual analysis.

    The process included the following key stages:

     

     

    • Preparation
      Review of technical documentation, test planning, and selection of relevant API endpoints.
    • Testing
      Gray-box pentest using both automated and manual methods, with a focus on authentication mechanisms and resistance to unauthorized access.
    • Analysis & Reporting
      Compilation of a detailed report outlining identified low-level vulnerabilities, along with practical recommendations to improve API security and documentation quality.
    How we can help you?

    Every cybersecurity case study we solve involves deep analysis, tailored solutions, and measurable results.
    Datami has already helped over 600 companies strengthen their digital defenses — and we can do the same for your business.
    Ready to take action?

    Let’s start with a free consultation!
    Results and recommendations
    Results and recommendations

    At the start of the project, BookingSync faced an undefined risk level: the platform had been continuously expanding its API endpoints without a full security audit, posing potential threats to the integrity of users’ personal data.

    During the gray-box penetration testing, the Datami team identified several low-level vulnerabilities. While not critical, these weaknesses could potentially be exploited to gain unauthorized access.

    Datami provided BookingSync with the following recommendations:

    1. Regularly assess new API endpoints for compliance with security standards.
    2. Improve the structure and clarity of API documentation.
    3. Implement an internal process for continuous API testing prior to releases.

    Following the implementation of the recommendations, the platform’s security posture improved, and the risk of API-related compromise was significantly reduced. The company avoided a potential data breach that could have led to reputational damage.

    The project was completed in just 3 weeks — nearly twice as fast as the typical market timeframe of 4–6 weeks. No critical incidents were detected, and all identified vulnerabilities were promptly addressed.

    Our certificates
    Key project takeaways

    Thanks to Datami's testing, BookingSync gained a current and detailed view of its API security status, mitigated low-level risks, and developed a clear action plan for future improvements.

    The project helped strengthen the protection of users’ personal data and prevent potential breaches.

    This case study confirms that even advanced tech companies with mature digital products require regular penetration testing to maintain a strong security posture.

     

    Category
    Before the project
    After implementation
    Security status
    Undefined risk due to ongoing API expansion
    Improved; several low-level vulnerabilities identified and resolved
    Critical vulnerabilities
    None observed, but potential unauthorized access threats existed
    No critical vulnerabilities detected
    Account compromise risk
    Theoretically possible via API logic
    Risks reduced through improved authentication
    Security compliance
    Partial adherence to best practices
    Achieved compliance with API security best practices
    Timeline
    Typical duration: 4–6 weeks
    Completed in 3 weeks
    More success stories with Datami
    Browse other project case studies
    Case Study Grindset Software: Payment System Pentest for PCI DSS Compliance

    Case Study Grindset Software: Payment System Pentest for PCI DSS Compliance

    • Conducted a black-box penetration test of critical payment system components
    • Discovered 15 vulnerabilities; 5 critical issues were resolved within 48 hours
    Services provided:
    Black-box penetration testing of the payment system, including assessment of web applications, servers, databases, and communication channels
    May 11, 2025
    Case Study: DAVITOO UKRAINE – LMS Security Testing Before HIPAA Certification

    Case Study: DAVITOO UKRAINE – LMS Security Testing Before HIPAA Certification

    • Completed a full security audit and gray-box penetration test of LMS Collaborator
    • Identified 15 vulnerabilities, including 5 critical issues, resolved within 24 hours
    Services provided:
    Gray-box penetration testing and security audit of the web platform, containerized environments, and network interactions
    May 11, 2025
    Case Study: Consulting Company – Security Testing of Web Resources and Infrastructure

    Case Study: Consulting Company – Security Testing of Web Resources and Infrastructure

    • Conducted black-box pentest of two web resources and infrastructure components
    • Identified 19 vulnerabilities: 1 critical, 8 medium, 7 low, and 3 informational
    Services provided:
    Black-box pentest of two web resources with different domain zones (UA and UK), and assessment of related infrastructure components
    May 10, 2025
    Security image
    Ready to assess your project's security?
    Contact Datami — we’ll help you identify risks, strengthen your cybersecurity, and confidently pass certification.
    Datami articles
    Internal Network Penetration Testing: Identify Vulnerabilities Before Attackers Do Oleksandr Filipov: Security engineer at Datami, author of articles
    Oleksandr Filipov: Security engineer at Datami, author of articles

    Internal Network Penetration Testing: Identify Vulnerabilities Before Attackers Do

    Learn what an Internal Network Penetration Test is and how to prepare for it. Discover the meaning, stages, and challenges of conducting an Internal Network Pen Testing.

    May 8, 2025
    Network Penetration Testing: What Is It? Oleksandr Filipov: Security engineer at Datami, author of articles
    Oleksandr Filipov: Security engineer at Datami, author of articles

    Network Penetration Testing: What Is It?

    What is network penetration testing? Learn more about the approaches and types of network pentests, the key stages, and the outcomes of a network penetration test.

    May 1, 2025
    Cybersecurity in healthcare: why hospitals have become a favorite target for hackers Oleksandr Filipov: Security engineer at Datami, author of articles
    Oleksandr Filipov: Security engineer at Datami, author of articles

    Cybersecurity in healthcare: why hospitals have become a favorite target for hackers

    Cybersecurity in healthcare is at risk: hospitals face more cyberattacks than banks. Learn how to protect medical data with expert tips from Datami.

    Apr 24, 2025
    Order a free consulidation
    We value your privacy
    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy