OWASP Top 10 For APIs
Topic: OWASP Top 10 For APIs
Application security threats are evolving.
Fortune 100 companies with large budgets and talented security engineers get breached through their APIs on a weekly basis.
Uber full account takeover, the famous Facebook breach, & the Verizon customer bills leakage are just a few recent examples of API based breaches.
Traditional vulnerabilities such as SQL injection, CSRF & XSS are less prevalent thanks to modern technologies and security education.
Attackers leverage the predictable and oversharing nature of REST APIs to exploit new types of vulnerabilities that are focused on business logic abuse and authorization.
OWASP has acknowledged this shift in threats and has announced the OWASP API Security Project. The project addresses modern API threats and provides mitigation techniques.
Come learn from the leader of the project about:
- OWASP Top 10 For APIs and how they are different from traditional top 10 lists.
- Examples of complex API exploits, which involve many steps
- How to exploit an API as a pentester, and how to protect it as a developer.
Speaker Details - Inon Shkedy
Inon Shkedy has 8 years of experience in application security. He started his career in a red team in a government organization for 5 years and then moved to Silicon Valley to learn more about startups, modern applications, and APIs. Today he provides consultation to various companies and leads the research for a startup in the field of API security.