Watch this video on YouTube
You are conducting an API security audit. What testing method should be employed to identify vulnerabilities in the API's authentication mechanisms?