SlideShare a Scribd company logo
The Evolution of
the OWASP API
Top 10
whoami
Head of Security Research
@ Traceable.ai
10+ Years in AppSec; 200+
Pen Tests
I’ve grown up with APIs
Government, Military, Financial
Multi Page Apps, On Prem, Waterfall,
Less APIs
Startups, Tier 1 Companies
Single Page Apps, Cloud, CI/CD,
Mostly APIs
www.traceable.ai | Slide 2
Project Background
1
Agenda
New trends in API Sec
2
What to expect?
3
www.traceable.ai | Slide 3
OWASP
“Open Web Application Security Project”
A non-profit organization & community
Educates developers & pen-testers about
AppSec
www.traceable.ai | Slide 4
Known OWASP
Projects
www.traceable.ai | Slide 5
ModSec / CRS
Juice Shop
ZAP
OWASP Top 10
Defines the Top 10 threats for Web
Apps
1
OWASP Top 10
Is published every few years
1
Helps engineers to navigate the endless
sea of security issues
▪ Focus on the top threats
1
www.traceable.ai | Slide 6
OWASP API
APIs are different from
WebApps
Background
The need for API List
www.traceable.ai | Slide 7
OWASP API
2019
First version
Got a lot of traction
▪ Gartner
▪ Press
▪ Developers trainings
▪ API security products
Things have changed since 2019!
www.traceable.ai | Slide 8
Creation
Process
www.traceable.ai | Slide 9
1. Gather information
● Bug bounty reports
● Public breaches
● Thought Leaders
2. Conduct a draft of the RC
3. Review by initial set of reviewers
4. Publish the RC
5. Gathering feedback from community
6. Adapting the list
7. Releasing the final list
What’s changed?
www.traceable.ai | Slide 10
Client
Client
Web
Server
Web
Server
(API)
GET /home.jsp Fetch Data
Fetch Data
HTML
JSON
Traditional
Modern
What’s New?
www.traceable.ai | Slide 11
Clien
t
Web
Server
(API)
Fetch Data
Client
JSON
JSON
JSON
● Clients:
More types, more powerful
● Less Abstraction Layers:
Shared language - JSON
The Good News
Issue Solved By
SQLi ORMs
CSRF
Use of Authorization
Header
XSS Clients are responsible
Path Manipulation Cloud Based Storage
XXE JSON
www.traceable.ai | Slide 12
The Bad News
www.traceable.ai | Slide 13
Larger attack surface
Oversharing
▪ More EPs
▪ More Data
▪ Underlying implementation
Predictable
▪ Easier to guess
Paulo Silva
www.traceable.ai | Slide 14
2023 List
Added a new leader to the project - Paulo Silva
Followed API security trends over the 2019-2022
▪ Bug bounty reports
▪ Public Breachers
▪ Vendors reports
▪ etc..
List is becoming less and less similar to the OWASP Top 10
The new list [Release Candidate]
www.traceable.ai | Slide 15
BOLA
Broken User Authentication
Excessive Data Exposure
Lack of rate limiting
BFLA
Mass Assignment
Security Misconfiguration
Injection
Improper Assets Management
Insufficient Logging &
Monitoring
BOLA
Broken Authentication
Broken Object Property Level
Authorization
Unrestricted Resource Consumption
BFLA
Server Side Request Forgery
Security Misconfiguration
Lack of Automated Threat Protection
Inventory Blind Spots
Unsafe Consumption of APIs
Expanded
Expanded
New
Items
BOPLA - Broken Object Property
Level Authorization
01.
SSRF - Server Side Request
Forgery
02.
Lack of Automated Threat
Protection
03.
Unrestricted Resource
Consumption
04.
www.traceable.ai | Slide 16
Unsafe Consumption of APIs
05
Removed
Items
Injection
01.
Insufficient Logging &
Monitoring
02.
Mass Assignment + Excessive
Data Exposure
03.
www.traceable.ai | Slide 17
Expanded
Items
Improper Assets Management →
Inventory Blindspot
01.
Broken User Authentication →
Broken Authentication
02.
www.traceable.ai | Slide 18
www.traceable.ai | Slide 19
Authorization ==
biggest risk
We see more and more AuthZ
issues
Implementing decent AuthZ in API is
becoming more and more challenging
Authz in APIs - The Challenge
www.traceable.ai | Slide 20
Object / Object
Property Level
Function Level
Code (Almost every
controller)
Code, Configuration,
API-gateway
Patients Care Provider Admins
Hugo
Sub
#1
Sub
#2
Bugo
Jon
Jack
Inon
Decentralized
Mechanism
Complex Users & Roles
Hierarchies
The AuthZ
Maze
www.traceable.ai | Slide 21
Function Level
Object Level
Object Property
Level
POST /api/host/accept_reservation
API Endpoint should be accessed
by hosts only
BFLA
Guest user
The AuthZ
Maze
www.traceable.ai | Slide 22
Function Level
Object Level
Object Property
Level
BOLA
POST /api/host/accept_reseravtion?id=919
A host should be able to access only
its own reservations
Host user
The AuthZ
Maze
www.traceable.ai | Slide 23
{“total_stay_price”:$1,000,000}
Object’s property “total_stay_price”
should not be set by the host
Host user
Function Level
Object Level
Object Property
Level
BOPLA
API #4 -
Unrestricted
Resource
Consumption
www.traceable.ai | Slide 24
DoS
www.traceable.ai | Slide 25
POST /upload_image
socialnetwork.com
408 Error
{“file_size”:”10000gb”}
Create thumbnails
www.traceable.ai | Slide 26
The Raise of API Bots
Many industries are suffering from
automated threats activity
Challenges!
www.traceable.ai | Slide 27
Bots are becoming more profitable.
Becoming smarter & more human (AI, ML)
● Fake reviews
Like AuthZ, the protection isn’t generic &
depends on business needs.
Scalping Bots == Emerging Threat
www.traceable.ai | Slide 28
Malicious
Patterns of
Bots
Gain advantage over normal users
01.
Excessive consumption
02.
www.traceable.ai | Slide 29
Advantage over
legit users
Speed Advantage
• Bots can buy items faster
• Bots can join raffles faster
Quantity Advantage
• Can vote many times
• Can post many comments
www.traceable.ai | Slide 30
Excessive
Consumption
Carding
www.traceable.ai | Slide 31
Credential Stuffing
Bots - Protection in Layers
www.traceable.ai | Slide 32
Rate Limiting
Stricter Rate Limiting for machine
consumed APIs
Restrict IP Addresses (reputation/geo/thor/proxies)
Restrict Devices (headless browsers)
Human Detection
Analyze Traffic for Abnormal Activity
SSRF
www.traceable.ai | Slide 33
POST api/upload_profile_pic_from_url
{“image_url”:”evil.com/10000GB.zip”}
GET /10000GB.zip
API evil.com
SSRF in APIs
More dangerous in APIs:
• Exposed management consoles (K8S/API gateways/etc)
More common in APIs:
• Web Hooks
• SSO (custom IDP)
www.traceable.ai | Slide 34
Inventory Blindspots - what you expose
www.traceable.ai | Slide 35
v1/payment v1/post_review v2/search
v1.2/old_export_user_dat
a
airbnb.com/users/api/
“Shadow APIs” - Endpoint aren’t
documented/forgotten
Inventory Blindspots - what you expose
www.traceable.ai | Slide 36
airbnb.com/users/api/ airbnb.com/host/api/ qa3.airbnb.com/backup_api/v1
“Shadow APIs” - forgotten APIs
www.traceable.ai | Slide 37
Inventory Blindspots
- what you expose
Unintentionally exposed APIs & Assets
Direct Access
Allowed
Inventory Blindspots - what you share
www.traceable.ai | Slide 38
Clients
Airbnb API
Gateway
Tax Microservice Guesty
Payment
Microservice
Services..
/b2b/sync_user_data
Why sharing
Payment details
with Guesty?
API #10 -
Unsafe
Consumption
of APIs
www.traceable.ai | Slide 39
Developers Trust 3rd Party APIs
www.traceable.ai | Slide 40
POST /create_users
{“user_name”:”aa’ OR ‘1’=’1”}
twitter_stats.com Twitter APIs
X
GET /top_users
400 Error {[{“user_name”:”’or ‘1’=’1”}]}
Why did we remove Injection?
www.traceable.ai | Slide 41
Why injections used to be common in the past?
- SQL Injections
- Command Injections
- Others, less common
SQL Injection - Less Common
www.traceable.ai | Slide 42
GET /search?query=’or ‘1’=’1
shop.com
string query1 = "SELECT title FROM [Product] WHERE [Name] = '" + ‘OR ‘1’=’1 + "' ;
SQL Injection - Less Common
www.traceable.ai | Slide 43
GET /search?query=’or ‘1’=’1
shop.com
{
var query = context.Product
.where(s => s.Name == "
’or ‘1’=’1")
.FirstOrDefault<Student>();
}
Shell Injection - Less Common
www.traceable.ai | Slide 44
POST /resize_image
{“new_size”:”& format C:/ &”, photo:<base64>}
album.com
strCmdText= "convert original.png -resize " +& format C:/ & + " new.png";
System.Diagnostics.Process.Start("CMD.exe",strCmdText);
Shell Injection - Less Common
www.traceable.ai | Slide 45
POST /resize_image
{“new_size”:”& format C:/ &”, photo:<base64>}
album.com
imageFactory.Load(inStream).Resize(”& format C:/ &);
● Code the uses Shell Commands isn’t scalable in microservices environment
● Abundance of 3rd party libraries & APIs replaces CLI tools
GraphQL, gRPC, WebSockets
o Share similar risks with traditional
protocols (REST/SOAP)
o We had a discussion what to do with
them
▪ Add specific examples/use-cases
▪ Expand Security Misconfiguration
New Protocols
www.traceable.ai | Slide 46
Contribute!
www.traceable.ai | Slide 47
Questions?
www.traceable.ai | Slide 48

More Related Content

Similar to APIsecure 2023 - The Present and Future of OWASP API Security Top 10, Inon Shkedy

Protecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API FirewallProtecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API Firewall
42Crunch
 
OWASPAPISecurity
OWASPAPISecurityOWASPAPISecurity
OWASPAPISecurity
Jie Liau
 
OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019
Miguel Angel Falcón Muñoz
 
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays
 
API Best Practices
API Best PracticesAPI Best Practices
API Best Practices
Sai Koppala
 
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Cristian Garcia G.
 
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays
 
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
APIsecure_ Official
 
Realizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityRealizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application Security
Ory Segal
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA Convergence
Kasun Indrasiri
 
SAP (In)Security: New and Best
SAP (In)Security: New and BestSAP (In)Security: New and Best
SAP (In)Security: New and Best
Positive Hack Days
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
Ankit Giri
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
CA API Management
 
Device Independent API design
Device Independent API designDevice Independent API design
Device Independent API design
Amrita jain
 
API Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentestersAPI Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentesters
Inon Shkedy
 
Apidays Helsinki 2024 - From Chaos to Calm- Navigating Emerging API Security...
Apidays Helsinki 2024 -  From Chaos to Calm- Navigating Emerging API Security...Apidays Helsinki 2024 -  From Chaos to Calm- Navigating Emerging API Security...
Apidays Helsinki 2024 - From Chaos to Calm- Navigating Emerging API Security...
apidays
 
Onsite Training - Secure Web Applications with Alibaba Cloud Web Application...
Onsite Training - Secure Web Applications with  Alibaba Cloud Web Application...Onsite Training - Secure Web Applications with  Alibaba Cloud Web Application...
Onsite Training - Secure Web Applications with Alibaba Cloud Web Application...
Forster CHIU
 
Cyberlands Sales Deck
Cyberlands Sales DeckCyberlands Sales Deck
Cyberlands Sales Deck
Cyberlands B.V.
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
CA API Management
 
Intro to Azure Api Management - With Cats
Intro to Azure Api Management - With CatsIntro to Azure Api Management - With Cats
Intro to Azure Api Management - With Cats
Xamariners
 

Similar to APIsecure 2023 - The Present and Future of OWASP API Security Top 10, Inon Shkedy (20)

Protecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API FirewallProtecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API Firewall
 
OWASPAPISecurity
OWASPAPISecurityOWASPAPISecurity
OWASPAPISecurity
 
OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019
 
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
 
API Best Practices
API Best PracticesAPI Best Practices
API Best Practices
 
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
 
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
 
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
 
Realizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityRealizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application Security
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA Convergence
 
SAP (In)Security: New and Best
SAP (In)Security: New and BestSAP (In)Security: New and Best
SAP (In)Security: New and Best
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Device Independent API design
Device Independent API designDevice Independent API design
Device Independent API design
 
API Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentestersAPI Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentesters
 
Apidays Helsinki 2024 - From Chaos to Calm- Navigating Emerging API Security...
Apidays Helsinki 2024 -  From Chaos to Calm- Navigating Emerging API Security...Apidays Helsinki 2024 -  From Chaos to Calm- Navigating Emerging API Security...
Apidays Helsinki 2024 - From Chaos to Calm- Navigating Emerging API Security...
 
Onsite Training - Secure Web Applications with Alibaba Cloud Web Application...
Onsite Training - Secure Web Applications with  Alibaba Cloud Web Application...Onsite Training - Secure Web Applications with  Alibaba Cloud Web Application...
Onsite Training - Secure Web Applications with Alibaba Cloud Web Application...
 
Cyberlands Sales Deck
Cyberlands Sales DeckCyberlands Sales Deck
Cyberlands Sales Deck
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
Intro to Azure Api Management - With Cats
Intro to Azure Api Management - With CatsIntro to Azure Api Management - With Cats
Intro to Azure Api Management - With Cats
 

More from apidays

Apidays Helsinki 2024 - Sustainable IT and API Performance - How to Bring The...
Apidays Helsinki 2024 - Sustainable IT and API Performance - How to Bring The...Apidays Helsinki 2024 - Sustainable IT and API Performance - How to Bring The...
Apidays Helsinki 2024 - Sustainable IT and API Performance - How to Bring The...
apidays
 
Apidays Helsinki 2024 - APIs ahoy, the case of Customer Booking APIs in Finn...
Apidays Helsinki 2024 -  APIs ahoy, the case of Customer Booking APIs in Finn...Apidays Helsinki 2024 -  APIs ahoy, the case of Customer Booking APIs in Finn...
Apidays Helsinki 2024 - APIs ahoy, the case of Customer Booking APIs in Finn...
apidays
 
Apidays Helsinki 2024 - What is next now that your organization created a (si...
Apidays Helsinki 2024 - What is next now that your organization created a (si...Apidays Helsinki 2024 - What is next now that your organization created a (si...
Apidays Helsinki 2024 - What is next now that your organization created a (si...
apidays
 
Apidays Helsinki 2024 - There’s no AI without API, but what does this mean fo...
Apidays Helsinki 2024 - There’s no AI without API, but what does this mean fo...Apidays Helsinki 2024 - There’s no AI without API, but what does this mean fo...
Apidays Helsinki 2024 - There’s no AI without API, but what does this mean fo...
apidays
 
Apidays Helsinki 2024 - Security Vulnerabilities in your APIs by Lukáš Ďurovs...
Apidays Helsinki 2024 - Security Vulnerabilities in your APIs by Lukáš Ďurovs...Apidays Helsinki 2024 - Security Vulnerabilities in your APIs by Lukáš Ďurovs...
Apidays Helsinki 2024 - Security Vulnerabilities in your APIs by Lukáš Ďurovs...
apidays
 
Apidays Helsinki 2024 - Data, API’s and Banks, with AI on top by Sergio Giral...
Apidays Helsinki 2024 - Data, API’s and Banks, with AI on top by Sergio Giral...Apidays Helsinki 2024 - Data, API’s and Banks, with AI on top by Sergio Giral...
Apidays Helsinki 2024 - Data, API’s and Banks, with AI on top by Sergio Giral...
apidays
 
Apidays Helsinki 2024 - Data Ecosystems Driving the Green Transition by Olli ...
Apidays Helsinki 2024 - Data Ecosystems Driving the Green Transition by Olli ...Apidays Helsinki 2024 - Data Ecosystems Driving the Green Transition by Olli ...
Apidays Helsinki 2024 - Data Ecosystems Driving the Green Transition by Olli ...
apidays
 
Apidays Helsinki 2024 - Bridging the Gap Between Backend and Frontend API Tes...
Apidays Helsinki 2024 - Bridging the Gap Between Backend and Frontend API Tes...Apidays Helsinki 2024 - Bridging the Gap Between Backend and Frontend API Tes...
Apidays Helsinki 2024 - Bridging the Gap Between Backend and Frontend API Tes...
apidays
 
Apidays Helsinki 2024 - API Compliance by Design by Marjukka Niinioja, Osaango
Apidays Helsinki 2024 - API Compliance by Design by Marjukka Niinioja, OsaangoApidays Helsinki 2024 - API Compliance by Design by Marjukka Niinioja, Osaango
Apidays Helsinki 2024 - API Compliance by Design by Marjukka Niinioja, Osaango
apidays
 
Apidays Helsinki 2024 - ABLOY goes API economy – Transformation story by Hann...
Apidays Helsinki 2024 - ABLOY goes API economy – Transformation story by Hann...Apidays Helsinki 2024 - ABLOY goes API economy – Transformation story by Hann...
Apidays Helsinki 2024 - ABLOY goes API economy – Transformation story by Hann...
apidays
 
Apidays New York 2024 - The subtle art of API rate limiting by Josh Twist, Zuplo
Apidays New York 2024 - The subtle art of API rate limiting by Josh Twist, ZuploApidays New York 2024 - The subtle art of API rate limiting by Josh Twist, Zuplo
Apidays New York 2024 - The subtle art of API rate limiting by Josh Twist, Zuplo
apidays
 
Apidays New York 2024 - RESTful API Patterns and Practices by Mike Amundsen, ...
Apidays New York 2024 - RESTful API Patterns and Practices by Mike Amundsen, ...Apidays New York 2024 - RESTful API Patterns and Practices by Mike Amundsen, ...
Apidays New York 2024 - RESTful API Patterns and Practices by Mike Amundsen, ...
apidays
 
Apidays New York 2024 - Putting AI into API Security by Corey Ball, Moss Adams
Apidays New York 2024 - Putting AI into API Security by Corey Ball, Moss AdamsApidays New York 2024 - Putting AI into API Security by Corey Ball, Moss Adams
Apidays New York 2024 - Putting AI into API Security by Corey Ball, Moss Adams
apidays
 
Apidays New York 2024 - Prototype-first - A modern API development workflow b...
Apidays New York 2024 - Prototype-first - A modern API development workflow b...Apidays New York 2024 - Prototype-first - A modern API development workflow b...
Apidays New York 2024 - Prototype-first - A modern API development workflow b...
apidays
 
Apidays New York 2024 - Post-Quantum API Security by Francois Lascelles, Broa...
Apidays New York 2024 - Post-Quantum API Security by Francois Lascelles, Broa...Apidays New York 2024 - Post-Quantum API Security by Francois Lascelles, Broa...
Apidays New York 2024 - Post-Quantum API Security by Francois Lascelles, Broa...
apidays
 
Apidays New York 2024 - Increase your productivity with no-code GraphQL mocki...
Apidays New York 2024 - Increase your productivity with no-code GraphQL mocki...Apidays New York 2024 - Increase your productivity with no-code GraphQL mocki...
Apidays New York 2024 - Increase your productivity with no-code GraphQL mocki...
apidays
 
Apidays New York 2024 - Driving API & EDA Success by Marcelo Caponi, Danone
Apidays New York 2024 - Driving API & EDA Success by Marcelo Caponi, DanoneApidays New York 2024 - Driving API & EDA Success by Marcelo Caponi, Danone
Apidays New York 2024 - Driving API & EDA Success by Marcelo Caponi, Danone
apidays
 
Apidays New York 2024 - Build a terrible API for people you hate by Jim Benne...
Apidays New York 2024 - Build a terrible API for people you hate by Jim Benne...Apidays New York 2024 - Build a terrible API for people you hate by Jim Benne...
Apidays New York 2024 - Build a terrible API for people you hate by Jim Benne...
apidays
 
Apidays New York 2024 - API Secret Tokens Exposed by Tristan Kalos and Antoin...
Apidays New York 2024 - API Secret Tokens Exposed by Tristan Kalos and Antoin...Apidays New York 2024 - API Secret Tokens Exposed by Tristan Kalos and Antoin...
Apidays New York 2024 - API Secret Tokens Exposed by Tristan Kalos and Antoin...
apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
 

More from apidays (20)

Apidays Helsinki 2024 - Sustainable IT and API Performance - How to Bring The...
Apidays Helsinki 2024 - Sustainable IT and API Performance - How to Bring The...Apidays Helsinki 2024 - Sustainable IT and API Performance - How to Bring The...
Apidays Helsinki 2024 - Sustainable IT and API Performance - How to Bring The...
 
Apidays Helsinki 2024 - APIs ahoy, the case of Customer Booking APIs in Finn...
Apidays Helsinki 2024 -  APIs ahoy, the case of Customer Booking APIs in Finn...Apidays Helsinki 2024 -  APIs ahoy, the case of Customer Booking APIs in Finn...
Apidays Helsinki 2024 - APIs ahoy, the case of Customer Booking APIs in Finn...
 
Apidays Helsinki 2024 - What is next now that your organization created a (si...
Apidays Helsinki 2024 - What is next now that your organization created a (si...Apidays Helsinki 2024 - What is next now that your organization created a (si...
Apidays Helsinki 2024 - What is next now that your organization created a (si...
 
Apidays Helsinki 2024 - There’s no AI without API, but what does this mean fo...
Apidays Helsinki 2024 - There’s no AI without API, but what does this mean fo...Apidays Helsinki 2024 - There’s no AI without API, but what does this mean fo...
Apidays Helsinki 2024 - There’s no AI without API, but what does this mean fo...
 
Apidays Helsinki 2024 - Security Vulnerabilities in your APIs by Lukáš Ďurovs...
Apidays Helsinki 2024 - Security Vulnerabilities in your APIs by Lukáš Ďurovs...Apidays Helsinki 2024 - Security Vulnerabilities in your APIs by Lukáš Ďurovs...
Apidays Helsinki 2024 - Security Vulnerabilities in your APIs by Lukáš Ďurovs...
 
Apidays Helsinki 2024 - Data, API’s and Banks, with AI on top by Sergio Giral...
Apidays Helsinki 2024 - Data, API’s and Banks, with AI on top by Sergio Giral...Apidays Helsinki 2024 - Data, API’s and Banks, with AI on top by Sergio Giral...
Apidays Helsinki 2024 - Data, API’s and Banks, with AI on top by Sergio Giral...
 
Apidays Helsinki 2024 - Data Ecosystems Driving the Green Transition by Olli ...
Apidays Helsinki 2024 - Data Ecosystems Driving the Green Transition by Olli ...Apidays Helsinki 2024 - Data Ecosystems Driving the Green Transition by Olli ...
Apidays Helsinki 2024 - Data Ecosystems Driving the Green Transition by Olli ...
 
Apidays Helsinki 2024 - Bridging the Gap Between Backend and Frontend API Tes...
Apidays Helsinki 2024 - Bridging the Gap Between Backend and Frontend API Tes...Apidays Helsinki 2024 - Bridging the Gap Between Backend and Frontend API Tes...
Apidays Helsinki 2024 - Bridging the Gap Between Backend and Frontend API Tes...
 
Apidays Helsinki 2024 - API Compliance by Design by Marjukka Niinioja, Osaango
Apidays Helsinki 2024 - API Compliance by Design by Marjukka Niinioja, OsaangoApidays Helsinki 2024 - API Compliance by Design by Marjukka Niinioja, Osaango
Apidays Helsinki 2024 - API Compliance by Design by Marjukka Niinioja, Osaango
 
Apidays Helsinki 2024 - ABLOY goes API economy – Transformation story by Hann...
Apidays Helsinki 2024 - ABLOY goes API economy – Transformation story by Hann...Apidays Helsinki 2024 - ABLOY goes API economy – Transformation story by Hann...
Apidays Helsinki 2024 - ABLOY goes API economy – Transformation story by Hann...
 
Apidays New York 2024 - The subtle art of API rate limiting by Josh Twist, Zuplo
Apidays New York 2024 - The subtle art of API rate limiting by Josh Twist, ZuploApidays New York 2024 - The subtle art of API rate limiting by Josh Twist, Zuplo
Apidays New York 2024 - The subtle art of API rate limiting by Josh Twist, Zuplo
 
Apidays New York 2024 - RESTful API Patterns and Practices by Mike Amundsen, ...
Apidays New York 2024 - RESTful API Patterns and Practices by Mike Amundsen, ...Apidays New York 2024 - RESTful API Patterns and Practices by Mike Amundsen, ...
Apidays New York 2024 - RESTful API Patterns and Practices by Mike Amundsen, ...
 
Apidays New York 2024 - Putting AI into API Security by Corey Ball, Moss Adams
Apidays New York 2024 - Putting AI into API Security by Corey Ball, Moss AdamsApidays New York 2024 - Putting AI into API Security by Corey Ball, Moss Adams
Apidays New York 2024 - Putting AI into API Security by Corey Ball, Moss Adams
 
Apidays New York 2024 - Prototype-first - A modern API development workflow b...
Apidays New York 2024 - Prototype-first - A modern API development workflow b...Apidays New York 2024 - Prototype-first - A modern API development workflow b...
Apidays New York 2024 - Prototype-first - A modern API development workflow b...
 
Apidays New York 2024 - Post-Quantum API Security by Francois Lascelles, Broa...
Apidays New York 2024 - Post-Quantum API Security by Francois Lascelles, Broa...Apidays New York 2024 - Post-Quantum API Security by Francois Lascelles, Broa...
Apidays New York 2024 - Post-Quantum API Security by Francois Lascelles, Broa...
 
Apidays New York 2024 - Increase your productivity with no-code GraphQL mocki...
Apidays New York 2024 - Increase your productivity with no-code GraphQL mocki...Apidays New York 2024 - Increase your productivity with no-code GraphQL mocki...
Apidays New York 2024 - Increase your productivity with no-code GraphQL mocki...
 
Apidays New York 2024 - Driving API & EDA Success by Marcelo Caponi, Danone
Apidays New York 2024 - Driving API & EDA Success by Marcelo Caponi, DanoneApidays New York 2024 - Driving API & EDA Success by Marcelo Caponi, Danone
Apidays New York 2024 - Driving API & EDA Success by Marcelo Caponi, Danone
 
Apidays New York 2024 - Build a terrible API for people you hate by Jim Benne...
Apidays New York 2024 - Build a terrible API for people you hate by Jim Benne...Apidays New York 2024 - Build a terrible API for people you hate by Jim Benne...
Apidays New York 2024 - Build a terrible API for people you hate by Jim Benne...
 
Apidays New York 2024 - API Secret Tokens Exposed by Tristan Kalos and Antoin...
Apidays New York 2024 - API Secret Tokens Exposed by Tristan Kalos and Antoin...Apidays New York 2024 - API Secret Tokens Exposed by Tristan Kalos and Antoin...
Apidays New York 2024 - API Secret Tokens Exposed by Tristan Kalos and Antoin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Recently uploaded

一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 

Recently uploaded (20)

一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 

APIsecure 2023 - The Present and Future of OWASP API Security Top 10, Inon Shkedy

  • 1. The Evolution of the OWASP API Top 10
  • 2. whoami Head of Security Research @ Traceable.ai 10+ Years in AppSec; 200+ Pen Tests I’ve grown up with APIs Government, Military, Financial Multi Page Apps, On Prem, Waterfall, Less APIs Startups, Tier 1 Companies Single Page Apps, Cloud, CI/CD, Mostly APIs www.traceable.ai | Slide 2
  • 3. Project Background 1 Agenda New trends in API Sec 2 What to expect? 3 www.traceable.ai | Slide 3
  • 4. OWASP “Open Web Application Security Project” A non-profit organization & community Educates developers & pen-testers about AppSec www.traceable.ai | Slide 4
  • 5. Known OWASP Projects www.traceable.ai | Slide 5 ModSec / CRS Juice Shop ZAP OWASP Top 10
  • 6. Defines the Top 10 threats for Web Apps 1 OWASP Top 10 Is published every few years 1 Helps engineers to navigate the endless sea of security issues ▪ Focus on the top threats 1 www.traceable.ai | Slide 6
  • 7. OWASP API APIs are different from WebApps Background The need for API List www.traceable.ai | Slide 7
  • 8. OWASP API 2019 First version Got a lot of traction ▪ Gartner ▪ Press ▪ Developers trainings ▪ API security products Things have changed since 2019! www.traceable.ai | Slide 8
  • 9. Creation Process www.traceable.ai | Slide 9 1. Gather information ● Bug bounty reports ● Public breaches ● Thought Leaders 2. Conduct a draft of the RC 3. Review by initial set of reviewers 4. Publish the RC 5. Gathering feedback from community 6. Adapting the list 7. Releasing the final list
  • 10. What’s changed? www.traceable.ai | Slide 10 Client Client Web Server Web Server (API) GET /home.jsp Fetch Data Fetch Data HTML JSON Traditional Modern
  • 11. What’s New? www.traceable.ai | Slide 11 Clien t Web Server (API) Fetch Data Client JSON JSON JSON ● Clients: More types, more powerful ● Less Abstraction Layers: Shared language - JSON
  • 12. The Good News Issue Solved By SQLi ORMs CSRF Use of Authorization Header XSS Clients are responsible Path Manipulation Cloud Based Storage XXE JSON www.traceable.ai | Slide 12
  • 13. The Bad News www.traceable.ai | Slide 13 Larger attack surface Oversharing ▪ More EPs ▪ More Data ▪ Underlying implementation Predictable ▪ Easier to guess
  • 14. Paulo Silva www.traceable.ai | Slide 14 2023 List Added a new leader to the project - Paulo Silva Followed API security trends over the 2019-2022 ▪ Bug bounty reports ▪ Public Breachers ▪ Vendors reports ▪ etc.. List is becoming less and less similar to the OWASP Top 10
  • 15. The new list [Release Candidate] www.traceable.ai | Slide 15 BOLA Broken User Authentication Excessive Data Exposure Lack of rate limiting BFLA Mass Assignment Security Misconfiguration Injection Improper Assets Management Insufficient Logging & Monitoring BOLA Broken Authentication Broken Object Property Level Authorization Unrestricted Resource Consumption BFLA Server Side Request Forgery Security Misconfiguration Lack of Automated Threat Protection Inventory Blind Spots Unsafe Consumption of APIs Expanded Expanded
  • 16. New Items BOPLA - Broken Object Property Level Authorization 01. SSRF - Server Side Request Forgery 02. Lack of Automated Threat Protection 03. Unrestricted Resource Consumption 04. www.traceable.ai | Slide 16 Unsafe Consumption of APIs 05
  • 17. Removed Items Injection 01. Insufficient Logging & Monitoring 02. Mass Assignment + Excessive Data Exposure 03. www.traceable.ai | Slide 17
  • 18. Expanded Items Improper Assets Management → Inventory Blindspot 01. Broken User Authentication → Broken Authentication 02. www.traceable.ai | Slide 18
  • 19. www.traceable.ai | Slide 19 Authorization == biggest risk We see more and more AuthZ issues Implementing decent AuthZ in API is becoming more and more challenging
  • 20. Authz in APIs - The Challenge www.traceable.ai | Slide 20 Object / Object Property Level Function Level Code (Almost every controller) Code, Configuration, API-gateway Patients Care Provider Admins Hugo Sub #1 Sub #2 Bugo Jon Jack Inon Decentralized Mechanism Complex Users & Roles Hierarchies
  • 21. The AuthZ Maze www.traceable.ai | Slide 21 Function Level Object Level Object Property Level POST /api/host/accept_reservation API Endpoint should be accessed by hosts only BFLA Guest user
  • 22. The AuthZ Maze www.traceable.ai | Slide 22 Function Level Object Level Object Property Level BOLA POST /api/host/accept_reseravtion?id=919 A host should be able to access only its own reservations Host user
  • 23. The AuthZ Maze www.traceable.ai | Slide 23 {“total_stay_price”:$1,000,000} Object’s property “total_stay_price” should not be set by the host Host user Function Level Object Level Object Property Level BOPLA
  • 25. DoS www.traceable.ai | Slide 25 POST /upload_image socialnetwork.com 408 Error {“file_size”:”10000gb”} Create thumbnails
  • 26. www.traceable.ai | Slide 26 The Raise of API Bots Many industries are suffering from automated threats activity
  • 27. Challenges! www.traceable.ai | Slide 27 Bots are becoming more profitable. Becoming smarter & more human (AI, ML) ● Fake reviews Like AuthZ, the protection isn’t generic & depends on business needs.
  • 28. Scalping Bots == Emerging Threat www.traceable.ai | Slide 28
  • 29. Malicious Patterns of Bots Gain advantage over normal users 01. Excessive consumption 02. www.traceable.ai | Slide 29
  • 30. Advantage over legit users Speed Advantage • Bots can buy items faster • Bots can join raffles faster Quantity Advantage • Can vote many times • Can post many comments www.traceable.ai | Slide 30
  • 32. Bots - Protection in Layers www.traceable.ai | Slide 32 Rate Limiting Stricter Rate Limiting for machine consumed APIs Restrict IP Addresses (reputation/geo/thor/proxies) Restrict Devices (headless browsers) Human Detection Analyze Traffic for Abnormal Activity
  • 33. SSRF www.traceable.ai | Slide 33 POST api/upload_profile_pic_from_url {“image_url”:”evil.com/10000GB.zip”} GET /10000GB.zip API evil.com
  • 34. SSRF in APIs More dangerous in APIs: • Exposed management consoles (K8S/API gateways/etc) More common in APIs: • Web Hooks • SSO (custom IDP) www.traceable.ai | Slide 34
  • 35. Inventory Blindspots - what you expose www.traceable.ai | Slide 35 v1/payment v1/post_review v2/search v1.2/old_export_user_dat a airbnb.com/users/api/ “Shadow APIs” - Endpoint aren’t documented/forgotten
  • 36. Inventory Blindspots - what you expose www.traceable.ai | Slide 36 airbnb.com/users/api/ airbnb.com/host/api/ qa3.airbnb.com/backup_api/v1 “Shadow APIs” - forgotten APIs
  • 37. www.traceable.ai | Slide 37 Inventory Blindspots - what you expose Unintentionally exposed APIs & Assets Direct Access Allowed
  • 38. Inventory Blindspots - what you share www.traceable.ai | Slide 38 Clients Airbnb API Gateway Tax Microservice Guesty Payment Microservice Services.. /b2b/sync_user_data Why sharing Payment details with Guesty?
  • 39. API #10 - Unsafe Consumption of APIs www.traceable.ai | Slide 39
  • 40. Developers Trust 3rd Party APIs www.traceable.ai | Slide 40 POST /create_users {“user_name”:”aa’ OR ‘1’=’1”} twitter_stats.com Twitter APIs X GET /top_users 400 Error {[{“user_name”:”’or ‘1’=’1”}]}
  • 41. Why did we remove Injection? www.traceable.ai | Slide 41 Why injections used to be common in the past? - SQL Injections - Command Injections - Others, less common
  • 42. SQL Injection - Less Common www.traceable.ai | Slide 42 GET /search?query=’or ‘1’=’1 shop.com string query1 = "SELECT title FROM [Product] WHERE [Name] = '" + ‘OR ‘1’=’1 + "' ;
  • 43. SQL Injection - Less Common www.traceable.ai | Slide 43 GET /search?query=’or ‘1’=’1 shop.com { var query = context.Product .where(s => s.Name == " ’or ‘1’=’1") .FirstOrDefault<Student>(); }
  • 44. Shell Injection - Less Common www.traceable.ai | Slide 44 POST /resize_image {“new_size”:”& format C:/ &”, photo:<base64>} album.com strCmdText= "convert original.png -resize " +& format C:/ & + " new.png"; System.Diagnostics.Process.Start("CMD.exe",strCmdText);
  • 45. Shell Injection - Less Common www.traceable.ai | Slide 45 POST /resize_image {“new_size”:”& format C:/ &”, photo:<base64>} album.com imageFactory.Load(inStream).Resize(”& format C:/ &); ● Code the uses Shell Commands isn’t scalable in microservices environment ● Abundance of 3rd party libraries & APIs replaces CLI tools
  • 46. GraphQL, gRPC, WebSockets o Share similar risks with traditional protocols (REST/SOAP) o We had a discussion what to do with them ▪ Add specific examples/use-cases ▪ Expand Security Misconfiguration New Protocols www.traceable.ai | Slide 46