SlideShare a Scribd company logo
1 of 40
Download to read offline
@DarkReading
Securing Your APIs: What You Need to
Know
Sponsored by
@DarkReading
Webinar Logistics
• Enable pop-ups within your browser
• Turn on your system’s sound to hear the streaming presentation
• Questions? Submit them to the presenters at anytime on the console
• Technical problems? Click “Help” or submit a question for assistance
Optimize your experience today
@DarkReading
Featured Presenters
Our knowledgeable speakers today are:
Dan Murphy
Software Engineering
Consultant
Veracode
Elisa Velarde
Senior Product
Marketing Manager
Veracode
Peggy Bresnick-
Kendler
Moderator
Dark Reading
Information Classification: General
Securing APIs: What you need to
know
Dark Reading
© Veracode, Inc. 2021 Confidential
4
Elisa Velarde, Sr. Product Marketing Manager
Dan Murphy, Architect & Consulting Software Engineer
January 25, 2022
Information Classification: General
Today's Presenters
Daniel Murphy
Architect / Consulting
Software Engineer
Elisa Velarde
Sr. Product Marketing
Manager
© Veracode, Inc. 2021 Confidential
5
Information Classification: General
© Veracode, Inc. 2021 Confidential
6
Information Classification: General
Integrate security into the pipeline
Automated scanning through integrations with
popular systems, plus APIs and code samples
Consolidate AppSec solutions
Simplify vendor management and reporting by
combining five analysis types in one solution
Cover all application types
Support for web, mobile, microservices in all
major programming languages and
frameworks
© Veracode, Inc. 2021 Confidential
7
Application Analysis
Information Classification: General
© Veracode, Inc. 2020 Confidential
8
Staying ahead of the threat is a daunting task
Hackers were responsible for over 4,000 attacks each day during 2020 or 1,460,000 attacks
by the end of the calendar year.
Largest Breaches and Hacks of 2020, The Year of the Digital Pandemic, Hacked.com
Information Classification: General
APIs: The rapidly
evolving attack
surface
© Veracode, Inc. 2021 Confidential
9
Information Classification: General
© Veracode, Inc. 2021 Confidential
10
Software Development is evolving, attack
surfaces are morphing
• Modern application architecture requires APIs
• Attackers are leveraging these new architectures with
increasing frequency
• "Shifting left" helps, but it's one dimensional
• Security teams need to dynamically test APIs before
they are integrated into larger applications where
remediation is more costly
Why scanning APIs at
runtime matters
By 2023, 90% of web-enabled
applications will have more
surface area for attack in the
form of exposed APIs rather than
the user interface (UI), up from
50% in 2020.
– Gartner MQ, 2021
In 2022, API abuses will move
from an infrequent to the most frequent
attack vector, resulting in
data breaches for enterprise web
applications.
– Gartner MQ, 2021
Information Classification: General
© Veracode, Inc. 2020 Confidential
11
What our customers are experiencing
“Shifting Left” is helpful, but doesn’t
address the runtime environment
Security teams still grapple with
balancing development velocity and
securing their APIs
Focused remediation is increasingly
difficult due to disparate applications,
context switching and “noisy” scan
results
AppSec teams need a more effective
way to solve the runtime security
problem for APIs
Information Classification: General
Scan Setup
Walkthrough
© Veracode, Inc. 2021 Confidential
12
Dan Murphy
Information Classification: General
© Veracode, Inc. 2020 Confidential
13
Information Classification: General
© Veracode, Inc. 2020 Confidential
14
Information Classification: General
© Veracode, Inc. 2020 Confidential
15
Information Classification: General
© Veracode, Inc. 2020 Confidential
16
Information Classification: General
© Veracode, Inc. 2020 Confidential
17
Information Classification: General
© Veracode, Inc. 2020 Confidential
18
Information Classification: General
© Veracode, Inc. 2020 Confidential
19
Information Classification: General
© Veracode, Inc. 2020 Confidential
20
Information Classification: General
© Veracode, Inc. 2020 Confidential
21
Information Classification: General
© Veracode, Inc. 2021 Confidential
22
Generating API Traffic
OpenAPI Spec HTTP Archive
Prescan Requests / Responses Injected Requests / Responses
Inside of the Scan Engine
Information Classification: General
© Veracode, Inc. 2021 Confidential
23
Good Specs = Good Coverage
Formats
Better
OK Best
Correct Types Examples
parameters:
- in: path
name: farmerId
required: true
schema:
type: string
parameters:
- in: path
name: farmerId
required: true
schema:
type: string
format: uuid
parameters:
- in: path
name: farmerId
required: true
schema:
type: string
format: uuid
example: 9BE20D4D- … 9D967
Information Classification: General
© Veracode, Inc. 2021 Confidential
24
Go Deep!
Controller
Service
Repository
PUT /user/{username}
{
"id": 42,
"username": "v3ra",
"firstName": "v3ra",
"lastName": "v3ra",
"email": "v4ra",
"referreralId": "v3ra"
}
DB
400 Bad Input
404 Not Found
500 Internal Server
Error
id: AB0B97B9-A858-428F-B025-
7D43A6B12E11
lastName: ”v3ra"
200 OK
X
X
X
✓
id: 42
lastName: “v3ra”
id: "1B2E84F7-7E32-42B4-BBD7-
254316ECF17B”
lastName: “v3ra”
id: 1B2E84F7-7E32-42B4-BBD7-254316ECF17B
lastName: "Hanna"
Information Classification: General
© Veracode, Inc. 2021 Confidential
25
Advanced Tricks
• OpenAPI converts to HAR
• Veracode allows the download of the
converted HAR
• HAR can be uploaded directly to scan
• Don’t like the conversion?
▪ Advanced users can tweak values
▪ Fine-grained control over inputs
▪ Not required, but nice for technical users
Information Classification: General
Scan Results
Walkthrough
© Veracode, Inc. 2021 Confidential
26
Dan Murphy
Information Classification: General
© Veracode, Inc. 2020 Confidential
27
Information Classification: General
© Veracode, Inc. 2020 Confidential
28
Information Classification: General
© Veracode, Inc. 2020 Confidential
29
Information Classification: General
© Veracode, Inc. 2020 Confidential
30
Information Classification: General
© Veracode, Inc. 2020 Confidential
31
Information Classification: General
© Veracode, Inc. 2020 Confidential
32
Information Classification: General
© Veracode, Inc. 2020 Confidential
33
Information Classification: General
© Veracode, Inc. 2020 Confidential
34
Information Classification: General
© Veracode, Inc. 2021 Confidential
35
Injection Points
PUT /api/v1/creature?universe=starwars HTTP/1.1
Host: api.example.com
Connection: keep-alive
Accept: application/json
Content-Type: application/json
Accept-Encoding: gzip,deflate
X-API-Key: deadbeef1337c0de
{
"id": 0,
"creature": "rancor",
"tags": ["big", "scary", "kinda adorable" ]
}
PATH FILE QUERY PARAM
QUERY VALUE
CUSTOM HEADER
JSON STRUCTURE JSON STRING VALUE
Information Classification: General
© Veracode, Inc. 2021 Confidential
36
SQL Injection Example
PUT /api/v1/endpoint HTTP/1.1
Host: api.example.com
Connection: keep-alive
Accept: application/json
Content-Type: application/json
Accept-Encoding: gzip,deflate
{
"id": 42,
"creature": "rancor",
"tags": ["big", "scary", "kinda adorable" ]
}
EXAMPLE PAYLOAD
{
"id": 42,
"creature": ”’select(0)from(select(sleep(15)));’",
"tags": ["big", "scary", "kinda adorable" ]
}
VULNERABLE CODE
var query = String.format("SELECT * FROM CREATURES
WHERE creature = ‘%s’", createFromPut);
stmt.execute(query);
RESPONSES
200 OK (response time 101 ms)
200 OK (response time 15101 ms)
Information Classification: General
© Veracode, Inc. 2021 Confidential
37
Generic Injection
PUT /api/v1/endpoint HTTP/1.1
Host: api.example.com
Connection: keep-alive
Accept: application/json
Content-Type: application/json
Accept-Encoding: gzip,deflate
{
"id": 42,
"creature": "rancor",
"tags": ["big", "scary", "kinda adorable" ]
}
{
”id": 42,
}
{
"id": 42 *zxxxxxxz,
}
{
"id": 42*zxxxxxxz,
}
{
"id": 42 *000000001,
}
{
"id": 42,
}
{
"id": 42 *000000001
}
PAYLOAD PAIRS EXPECTED TO BE DIFFERENT
Information Classification: General
© Veracode, Inc. 2021 Confidential
38
Thank You
@DarkReading
Questions?
Submit questions to the presenters via the on-screen text box
Peggy Bresnick-
Kendler
Moderator
Dark Reading
Dan Murphy
Software Engineering
Consultant
Veracode
Elisa Velarde
Senior Product
Marketing Manager
Veracode
@DarkReading
Thank you for attending
Please visit our sponsor and access any of the resources featured in
the resource section of the attendee console.

More Related Content

Similar to DarkReading - Securing Your APIs What You Need to Know.pdf

Operationalize all the network things
Operationalize all the network thingsOperationalize all the network things
Operationalize all the network thingsLori MacVittie
 
2023_2_CNCF_TAP_Backstage.pdf
2023_2_CNCF_TAP_Backstage.pdf2023_2_CNCF_TAP_Backstage.pdf
2023_2_CNCF_TAP_Backstage.pdfahjensen
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshowpatmisasi
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...ThousandEyes
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
API Design – More than just a Payload Definition
API Design – More than just a Payload DefinitionAPI Design – More than just a Payload Definition
API Design – More than just a Payload DefinitionPhil Wilkins
 
Aerohive - The Connected Experience
Aerohive - The Connected ExperienceAerohive - The Connected Experience
Aerohive - The Connected ExperienceVITO - Securitas
 
Firewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessFirewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessSumit Sarkar
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation finalAlgoSec
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdfThousandEyes
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersEnterprise Management Associates
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesThousandEyes
 
Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Open Networking Summits
 
Protecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaCProtecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaCFernando Cardoso
 

Similar to DarkReading - Securing Your APIs What You Need to Know.pdf (20)

Operationalize all the network things
Operationalize all the network thingsOperationalize all the network things
Operationalize all the network things
 
2023_2_CNCF_TAP_Backstage.pdf
2023_2_CNCF_TAP_Backstage.pdf2023_2_CNCF_TAP_Backstage.pdf
2023_2_CNCF_TAP_Backstage.pdf
 
TFI2014 Session I - State of SDN - John Giacomoni
TFI2014 Session I - State of SDN - John GiacomoniTFI2014 Session I - State of SDN - John Giacomoni
TFI2014 Session I - State of SDN - John Giacomoni
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
API Design – More than just a Payload Definition
API Design – More than just a Payload DefinitionAPI Design – More than just a Payload Definition
API Design – More than just a Payload Definition
 
Aerohive - The Connected Experience
Aerohive - The Connected ExperienceAerohive - The Connected Experience
Aerohive - The Connected Experience
 
Firewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessFirewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data access
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdf
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyes
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...
 
Protecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaCProtecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaC
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

DarkReading - Securing Your APIs What You Need to Know.pdf

  • 1. @DarkReading Securing Your APIs: What You Need to Know Sponsored by
  • 2. @DarkReading Webinar Logistics • Enable pop-ups within your browser • Turn on your system’s sound to hear the streaming presentation • Questions? Submit them to the presenters at anytime on the console • Technical problems? Click “Help” or submit a question for assistance Optimize your experience today
  • 3. @DarkReading Featured Presenters Our knowledgeable speakers today are: Dan Murphy Software Engineering Consultant Veracode Elisa Velarde Senior Product Marketing Manager Veracode Peggy Bresnick- Kendler Moderator Dark Reading
  • 4. Information Classification: General Securing APIs: What you need to know Dark Reading © Veracode, Inc. 2021 Confidential 4 Elisa Velarde, Sr. Product Marketing Manager Dan Murphy, Architect & Consulting Software Engineer January 25, 2022
  • 5. Information Classification: General Today's Presenters Daniel Murphy Architect / Consulting Software Engineer Elisa Velarde Sr. Product Marketing Manager © Veracode, Inc. 2021 Confidential 5
  • 6. Information Classification: General © Veracode, Inc. 2021 Confidential 6
  • 7. Information Classification: General Integrate security into the pipeline Automated scanning through integrations with popular systems, plus APIs and code samples Consolidate AppSec solutions Simplify vendor management and reporting by combining five analysis types in one solution Cover all application types Support for web, mobile, microservices in all major programming languages and frameworks © Veracode, Inc. 2021 Confidential 7 Application Analysis
  • 8. Information Classification: General © Veracode, Inc. 2020 Confidential 8 Staying ahead of the threat is a daunting task Hackers were responsible for over 4,000 attacks each day during 2020 or 1,460,000 attacks by the end of the calendar year. Largest Breaches and Hacks of 2020, The Year of the Digital Pandemic, Hacked.com
  • 9. Information Classification: General APIs: The rapidly evolving attack surface © Veracode, Inc. 2021 Confidential 9
  • 10. Information Classification: General © Veracode, Inc. 2021 Confidential 10 Software Development is evolving, attack surfaces are morphing • Modern application architecture requires APIs • Attackers are leveraging these new architectures with increasing frequency • "Shifting left" helps, but it's one dimensional • Security teams need to dynamically test APIs before they are integrated into larger applications where remediation is more costly Why scanning APIs at runtime matters By 2023, 90% of web-enabled applications will have more surface area for attack in the form of exposed APIs rather than the user interface (UI), up from 50% in 2020. – Gartner MQ, 2021 In 2022, API abuses will move from an infrequent to the most frequent attack vector, resulting in data breaches for enterprise web applications. – Gartner MQ, 2021
  • 11. Information Classification: General © Veracode, Inc. 2020 Confidential 11 What our customers are experiencing “Shifting Left” is helpful, but doesn’t address the runtime environment Security teams still grapple with balancing development velocity and securing their APIs Focused remediation is increasingly difficult due to disparate applications, context switching and “noisy” scan results AppSec teams need a more effective way to solve the runtime security problem for APIs
  • 12. Information Classification: General Scan Setup Walkthrough © Veracode, Inc. 2021 Confidential 12 Dan Murphy
  • 13. Information Classification: General © Veracode, Inc. 2020 Confidential 13
  • 14. Information Classification: General © Veracode, Inc. 2020 Confidential 14
  • 15. Information Classification: General © Veracode, Inc. 2020 Confidential 15
  • 16. Information Classification: General © Veracode, Inc. 2020 Confidential 16
  • 17. Information Classification: General © Veracode, Inc. 2020 Confidential 17
  • 18. Information Classification: General © Veracode, Inc. 2020 Confidential 18
  • 19. Information Classification: General © Veracode, Inc. 2020 Confidential 19
  • 20. Information Classification: General © Veracode, Inc. 2020 Confidential 20
  • 21. Information Classification: General © Veracode, Inc. 2020 Confidential 21
  • 22. Information Classification: General © Veracode, Inc. 2021 Confidential 22 Generating API Traffic OpenAPI Spec HTTP Archive Prescan Requests / Responses Injected Requests / Responses Inside of the Scan Engine
  • 23. Information Classification: General © Veracode, Inc. 2021 Confidential 23 Good Specs = Good Coverage Formats Better OK Best Correct Types Examples parameters: - in: path name: farmerId required: true schema: type: string parameters: - in: path name: farmerId required: true schema: type: string format: uuid parameters: - in: path name: farmerId required: true schema: type: string format: uuid example: 9BE20D4D- … 9D967
  • 24. Information Classification: General © Veracode, Inc. 2021 Confidential 24 Go Deep! Controller Service Repository PUT /user/{username} { "id": 42, "username": "v3ra", "firstName": "v3ra", "lastName": "v3ra", "email": "v4ra", "referreralId": "v3ra" } DB 400 Bad Input 404 Not Found 500 Internal Server Error id: AB0B97B9-A858-428F-B025- 7D43A6B12E11 lastName: ”v3ra" 200 OK X X X ✓ id: 42 lastName: “v3ra” id: "1B2E84F7-7E32-42B4-BBD7- 254316ECF17B” lastName: “v3ra” id: 1B2E84F7-7E32-42B4-BBD7-254316ECF17B lastName: "Hanna"
  • 25. Information Classification: General © Veracode, Inc. 2021 Confidential 25 Advanced Tricks • OpenAPI converts to HAR • Veracode allows the download of the converted HAR • HAR can be uploaded directly to scan • Don’t like the conversion? ▪ Advanced users can tweak values ▪ Fine-grained control over inputs ▪ Not required, but nice for technical users
  • 26. Information Classification: General Scan Results Walkthrough © Veracode, Inc. 2021 Confidential 26 Dan Murphy
  • 27. Information Classification: General © Veracode, Inc. 2020 Confidential 27
  • 28. Information Classification: General © Veracode, Inc. 2020 Confidential 28
  • 29. Information Classification: General © Veracode, Inc. 2020 Confidential 29
  • 30. Information Classification: General © Veracode, Inc. 2020 Confidential 30
  • 31. Information Classification: General © Veracode, Inc. 2020 Confidential 31
  • 32. Information Classification: General © Veracode, Inc. 2020 Confidential 32
  • 33. Information Classification: General © Veracode, Inc. 2020 Confidential 33
  • 34. Information Classification: General © Veracode, Inc. 2020 Confidential 34
  • 35. Information Classification: General © Veracode, Inc. 2021 Confidential 35 Injection Points PUT /api/v1/creature?universe=starwars HTTP/1.1 Host: api.example.com Connection: keep-alive Accept: application/json Content-Type: application/json Accept-Encoding: gzip,deflate X-API-Key: deadbeef1337c0de { "id": 0, "creature": "rancor", "tags": ["big", "scary", "kinda adorable" ] } PATH FILE QUERY PARAM QUERY VALUE CUSTOM HEADER JSON STRUCTURE JSON STRING VALUE
  • 36. Information Classification: General © Veracode, Inc. 2021 Confidential 36 SQL Injection Example PUT /api/v1/endpoint HTTP/1.1 Host: api.example.com Connection: keep-alive Accept: application/json Content-Type: application/json Accept-Encoding: gzip,deflate { "id": 42, "creature": "rancor", "tags": ["big", "scary", "kinda adorable" ] } EXAMPLE PAYLOAD { "id": 42, "creature": ”’select(0)from(select(sleep(15)));’", "tags": ["big", "scary", "kinda adorable" ] } VULNERABLE CODE var query = String.format("SELECT * FROM CREATURES WHERE creature = ‘%s’", createFromPut); stmt.execute(query); RESPONSES 200 OK (response time 101 ms) 200 OK (response time 15101 ms)
  • 37. Information Classification: General © Veracode, Inc. 2021 Confidential 37 Generic Injection PUT /api/v1/endpoint HTTP/1.1 Host: api.example.com Connection: keep-alive Accept: application/json Content-Type: application/json Accept-Encoding: gzip,deflate { "id": 42, "creature": "rancor", "tags": ["big", "scary", "kinda adorable" ] } { ”id": 42, } { "id": 42 *zxxxxxxz, } { "id": 42*zxxxxxxz, } { "id": 42 *000000001, } { "id": 42, } { "id": 42 *000000001 } PAYLOAD PAIRS EXPECTED TO BE DIFFERENT
  • 38. Information Classification: General © Veracode, Inc. 2021 Confidential 38 Thank You
  • 39. @DarkReading Questions? Submit questions to the presenters via the on-screen text box Peggy Bresnick- Kendler Moderator Dark Reading Dan Murphy Software Engineering Consultant Veracode Elisa Velarde Senior Product Marketing Manager Veracode
  • 40. @DarkReading Thank you for attending Please visit our sponsor and access any of the resources featured in the resource section of the attendee console.