Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Prevent Malicious Hacking Attacks on your APIs


Published on

Injection attack is by far the most likely and common type of attack hackers are likely to attempt to explore vulnerabilities in your API. This presentation talks about different classes of attacks people may send against your API parameters.

To test how your APIs behave against these attacks, you can use SoapUI’s Security feature as shown here -

Published in: Software, Technology
  • Be the first to comment

Prevent Malicious Hacking Attacks on your APIs

  1. 1. Prevent Malicious Hacking attacks on your APIs Michael Giller @GillerMichael
  2. 2. @GillerMichael Security Scans Overview - Injection  SQL Injection:  tries to exploit bad database integration coding  XPath Injection:  tries to exploit bad XML processing inside your target service
  3. 3. @GillerMichael Security Scans Overview - Injection  Code Injection:  Watch out for those eval() functions!  Log Injection  Could be used to stir up false alarms  XML External Entity Injection  Vulnerabilities in XML parsing
  4. 4. @GillerMichael Security Scans Overview - XSS  Cross Site Scripting (XSS):  enables attackers to inject client-side script into Web pages viewed by other users.  Used to bypass same origin policy  Could be used to plant a Trojan horse, get full access to user cookies and history, etc
  5. 5. @GillerMichael Security Scans Overview - DoS  Denial-of-Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users – E.g. CyberBunker launched an all-out assault, on a spam-fighting company Spamhaus
  6. 6. @GillerMichael Security Scans Overview  Check user permissions:  Make sure that your users can only access the information they need to access  Watch out for sequential IDs
  7. 7. @GillerMichael Security Scans Overview (Cont.)  Malformed XML:  tries to exploit bad handling of invalid XML on your server or in your service  XML Bomb :  tries to exploit bad handling of malicious XML request (be careful)  Malicious Attachment:  tries to exploit bad handling of attached files
  8. 8. @GillerMichael Security Scans Overview (Cont.)  Fuzzing Scan:  generates random input for specified request parameters for a specified number of requests  Custom Script:  allows you to use a script for generating custom parameter fuzzing values
  9. 9. References: @GillerMichael • SoapUI team had a great informational “Better Safe Than Sony” webinar discussing security. You can watch it here:  webinar.html • Open Web Application Security Project (OWASP) published top 10 most common types of attacks here:  • Here’s the attacks particular to REST: 