TYPES OF API & vulnerabilities (Muqaddas Bin Tahir) .pptx

muqaddastahir7 22 views 19 slides Oct 02, 2024
Slide 1
Slide 1 of 19
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19

About This Presentation

a Comprehensive overview on types of APIs and Vulnerabilities designed by Muqaddas
APIs (Application Programming Interfaces) have become an essential part of modern software development, enabling different systems to communicate and work together efficiently. In my presentation, "Types of APIs ...


Slide Content

VULNERABILITIES AND TYPES OF API’S MUQADDAS BIN TAHIR MUQADDAS BIN TAHIR

Types of API’s Open APIs− Open-source application programming interfaces Also known as Public API, there are no restrictions to access these types of APIs because they are publicly available. Open APIs can been can been access by any developer. MUQADDAS BIN TAHIR

Types of API’s Partner APIs− This API exposed to a particular person. A developer needs specific rights or licenses in order to access this type of API because they are not publicly available. Partner APIs can been access by only authorized developers. MUQADDAS BIN TAHIR

Types of API’s Internal APIs− Also known as Private APIs, This type of api’s will remain hidden from external users. Internal API’s are implemented for internal use within a company. Many orginasation uses this type of API among the different internal teams to improve its products and services. Internal APIs can been access by only internal teams. MUQADDAS BIN TAHIR

Types of API’s Composite APIs − This type of API uses to combines different data and service APIs. By using this services developers can access several endpoints in a single call. Its main uses are to speed up the process of execution and improve the performance of the end user at the web interfaces. Composite APIs are used to combine multiple APIs. MUQADDAS BIN TAHIR

VULNERABILITIES IN AN API MUQADDAS BIN TAHIR

Vulnerability Vulnerability− A vulnerability is a loophole or error in a system or device’s code. It is exploited to compromise the CIA (confidentiality, integrity and availability) of data stored in the system through unauthorized access to cause denial of service or to theft the data. MUQADDAS BIN TAHIR

Vulnerability Vulnerability− A vulnerability is a loophole or error in a system or device’s code. It is exploited to compromise the CIA (confidentiality, integrity and availability) of data stored in the system through unauthorized access to cause denial of service or to theft the data. MUQADDAS BIN TAHIR

owasp top 10 api of vulnerabilities MUQADDAS BIN TAHIR

Vulnerability Broken Object Level Authorization Broken object-level authorizations (BOLA) is also known as insecure direct object reference (IDOR). This issue occurs when the server does not properly verify if the currently authorized user or an unauthorized user is accessing data to read, update or delete an object to which they are not having the rights. MUQADDAS BIN TAHIR

Vulnerability Broken User Authentication Poor implementation of API authentication allows attackers to predict other users identities. In more general terms, broken user authentication occurs when an API having an authentication system but does not in working, or that the implemented authentication system fails in some cases, allowing attackers to project himself as an authenticated user. MUQADDAS BIN TAHIR

Vulnerability Excessive Data Exposure API should be limited to provide access for the data to the front-end clients but sometimes developers will make a mistake or take the some easy shortcut and develop the APIs that provide access for all data to the client. When these API's provide access too more data then the user needs, we call it as a Excessive Data Exposure. MUQADDAS BIN TAHIR

Vulnerability Lack of Resources & Rate Limiting If the API is not protected against an excessive amount of requests or payload sizes. There will be a possiblility for an attackers to use this for Denial of Service (DoS) and authentication flaws like brute force attacks. MUQADDAS BIN TAHIR

Vulnerability Broken Function Level Authorization If the API provide access to the client to use user level or admin level APIs as appropriate. If attackers figure out the “hidden” admin API methods of admin access and access them directly. MUQADDAS BIN TAHIR

Vulnerability Mass Assignment If the API takes data from the client and stores it without proper filtering for whitelisted properties or guidelines. There is a possibility that attackers can try to predict object properties or add additional object parameters in their requests, to read the documentation, or check out weather the API endpoints for clues where to find the openings to modify parameter that they are not supposed to impact the data objects stored in the backend. MUQADDAS BIN TAHIR

Vulnerability Security Misconfiguration Lack of security configuration and providing access of the API servers to clients, which allows attackers to exploit the vulnerabilities to gain access into the server. MUQADDAS BIN TAHIR

Vulnerability Injection Attackers will been able to construct API calls that include SQL, NoSQL, LDAP, OS, or other commands on that the API request and the backend behind it blindly executes that api request leads to the injection. MUQADDAS BIN TAHIR

Vulnerability Improper Assets Management Attackers find an un-updated versions of the API (for example, staging, testing, beta, or earlier versions) that are not well protected or secured as the production of API, and attacker use those to launch their attacks. MUQADDAS BIN TAHIR

Vulnerability Insufficient Logging & Monitoring Lack of proper monitoring of data and traffic of the network passing into the server and logging activities and alerting incase case of unauthorized access or activity will open doors for an attacker. MUQADDAS BIN TAHIR