Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
API Security for White Hat Hackers

You're reading from   API Security for White Hat Hackers Uncover offensive defense strategies and get up to speed with secure API implementation

Arrow left icon
Product type Paperback
Published in Jun 2024
Publisher Packt
ISBN-13 9781800560802
Length 418 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Confidence Staveley Confidence Staveley
Author Profile Icon Confidence Staveley
Confidence Staveley
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Preface 1. Part 1: Understanding API Security Fundamentals FREE CHAPTER
2. Chapter 1: Introduction to API Architecture and Security 3. Chapter 2: The Evolving API Threat Landscape and Security Considerations 4. Chapter 3: OWASP API Security Top 10 Explained 5. Part 2: Offensive API Hacking
6. Chapter 4: API Attack Strategies and Tactics 7. Chapter 5: Exploiting API Vulnerabilities 8. Chapter 6: Bypassing API Authentication and Authorization Controls 9. Chapter 7: Attacking API Input Validation and Encryption Techniques 10. Part 3: Advanced Techniques for API Security Testing and Exploitation
11. Chapter 8: API Vulnerability Assessment and Penetration Testing 12. Chapter 9: Advanced API Testing: Approaches, Tools, and Frameworks 13. Chapter 10: Using Evasion Techniques 14. Part 4: API Security for Technical Management Professionals
15. Chapter 11: Best Practices for Secure API Design and Implementation 16. Chapter 12: Challenges and Considerations for API Security in Large Enterprises 17. Chapter 13: Implementing Effective API Governance and Risk Management Initiatives 18. Index 19. Other Books You May Enjoy

OWASP and the API Security Top 10 – A timeline

The OWASP is a non-profit, community-oriented foundation that’s committed to advancing software security. Embracing an open, collaborative methodology, OWASP promotes the integration of security at every phase of the software development process. Its resources, sought by small businesses to large corporations and government bodies, are freely available to all, embodying a vision where everyone has access to enhanced software security.

Recognizing APIs’ growing relevance and associated vulnerabilities, the OWASP API Security Top 10 was released in 2019. Unfortunately, APIs, which are critical in modern software development, expose backend data to third-party users, making them ideal targets for cyber-attacks. The OWASP API Security Top 10 highlights pressing API threats, facilitating a safer API environment.

The creation of this list is typically a multi-stage process. The process begins with a thorough risk evaluation based on the OWASP Risk Rating Methodology. This preliminary analysis is then critically assessed by experienced professionals. A draft is created by combining statistical data with professional views to highlight urgent API concerns.

The most recent version of this guide is the OWASP API Security Top 10 2023, which was published in June 2023; it’s a revamped version of its predecessor from 2019. While preserving numerous basic aspects from the previous version, the 2023 update reflects the continuously changing API security environment and includes newly discovered attack paths identified in previous years:

OWASP API TOP 10 (2019)

OWASP API TOP 10 (2023)

API 1

Broken Object Level Authorization

API 1

Broken Object Level Authorization

API 2

Broken User Authentication

API 2

Broken Authentication

API 3

Excessive Data Exposure

API 3

Broken Object Property Level Authorization

API 4

Lack of Resources and Rate Limiting

API 4

Unrestricted Resource Consumption

API 5

Broken Function Level Authorization

API 5

Broken Function Level Authorization

API 6

Mass Assignment

API 6

Unrestricted Access to Sensitive Business Flows

API 7

Security Misconfiguration

API 7

Server Side Request Forgery

API 8

Injection

API 8

Security Misconfiguration

API 9

Improper Assets Management

API 9

Improper Inventory Management

API 10

Insufficient Logging and Monitoring

API 10

Unsafe Consumption of APIs

Table 3.1 – The evolution of OWASP API Security Top 10 vulnerabilities (white: included in 2019 | red: removed | green: newly added)

As malicious actors increasingly target API business logic, where they engage in long-term nefarious operations that can last weeks or months, it is critical to understand the major threats plaguing today’s API ecosystems. This acknowledgment is a necessary first step in developing evolved and comprehensive API security plans. However, it’s important to note that the OWASP API Security Top 10 is a great guide, but it doesn’t cover everything.

In the next section of this chapter, we’ll discuss each vulnerability on the list, giving you a fuller picture of each one.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image