SlideShare a Scribd company logo
Prevent Malicious
Hacking attacks on
your APIs
Michael Giller @GillerMichael
@GillerMichael
Security Scans Overview - Injection
 SQL Injection:
 tries to exploit bad database integration coding
 XPath Injection:
 tries to exploit bad XML processing inside your
target service
@GillerMichael
Security Scans Overview - Injection
 Code Injection:
 Watch out for those eval() functions!
 Log Injection
 Could be used to stir up false alarms
 XML External Entity Injection
 Vulnerabilities in XML parsing
@GillerMichael
Security Scans Overview - XSS
 Cross Site Scripting (XSS):
 enables attackers to inject client-side script into Web
pages viewed by other users.
 Used to bypass same origin policy
 Could be used to plant a Trojan horse, get full access to
user cookies and history, etc
@GillerMichael
Security Scans Overview - DoS
 Denial-of-Service (DoS) attack is an attempt
to make a machine or network resource
unavailable to its intended users
– E.g. CyberBunker launched an all-out assault, on a
spam-fighting company Spamhaus
@GillerMichael
Security Scans Overview
 Check user permissions:
 Make sure that your users can only access the
information they need to access
 Watch out for sequential IDs
@GillerMichael
Security Scans Overview (Cont.)
 Malformed XML:
 tries to exploit bad handling of invalid XML on your
server or in your service
 XML Bomb :
 tries to exploit bad handling of malicious XML
request (be careful)
 Malicious Attachment:
 tries to exploit bad handling of attached files
@GillerMichael
Security Scans Overview (Cont.)
 Fuzzing Scan:
 generates random input for specified request
parameters for a specified number of requests
 Custom Script:
 allows you to use a script for generating custom
parameter fuzzing values
References:
@GillerMichael
• SoapUI team had a great informational “Better Safe Than Sony”
webinar discussing security. You can watch it here:
 http://www.soapui.org/soapUI-News/watch-yesterdays-
webinar.html
• Open Web Application Security Project (OWASP) published top
10 most common types of attacks here:
 https://www.owasp.org/index.php/OWASP_Top_Ten_Cheat_Sheet
• Here’s the attacks particular to REST:
 https://www.owasp.org/index.php/REST_Security_Cheat_Sheet

More Related Content

PDF
owasp_meetup_12_10
sean_todd
 
PDF
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
SV Ruby on Rails Meetup
 
PPTX
Web Application Security 101
Jannis Kirschner
 
PPTX
Web app security essentials
Rafał Hryniewski
 
PDF
Serverless Security Checklist
Simform
 
PDF
Introduction to Security Testing
vodQA
 
PDF
Web Application Security and Awareness
Abdul Rahman Sherzad
 
PPTX
Web application Security tools
Nico Penaredondo
 
owasp_meetup_12_10
sean_todd
 
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
SV Ruby on Rails Meetup
 
Web Application Security 101
Jannis Kirschner
 
Web app security essentials
Rafał Hryniewski
 
Serverless Security Checklist
Simform
 
Introduction to Security Testing
vodQA
 
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Web application Security tools
Nico Penaredondo
 

What's hot (20)

PPTX
Web Application Vulnerabilities
Preetish Panda
 
PPTX
OWASP
gehad hamdy
 
PPT
Owasp Top 10 - Owasp Pune Chapter - January 2008
abhijitapatil
 
PPTX
security misconfigurations
Megha Sahu
 
PPTX
A5: Security Misconfiguration
Tariq Islam
 
PPTX
Security testing fundamentals
Cygnet Infotech
 
PPTX
Web tools ppt
Tamara Pia Agavi
 
PPT
Step by step guide for web application security testing
Avyaan, Web Security Company in India
 
PPTX
Owasp top 10 vulnerabilities
OWASP Delhi
 
PPTX
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
 
PPTX
Hacker Halted Miami , USA 2010
Aditya K Sood
 
PPTX
OWASP Khartoum Top 10 A4 - 7th meeting
OWASP Khartoum
 
PDF
Identity Security - Azure Identity Protection
Eng Teong Cheah
 
PDF
Detecting Ransomware/Bot Infections in Elasticsearch
Aditya K Sood
 
PPTX
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
 
PPTX
Owasp top 10 2017
ibrahimumer2
 
PPTX
Security Testing Training With Examples
Alwin Thayyil
 
PPTX
Microservices Security
Aditi Anand
 
PPTX
Owasp top 10 security threats
Vishal Kumar
 
PDF
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
All Things Open
 
Web Application Vulnerabilities
Preetish Panda
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
abhijitapatil
 
security misconfigurations
Megha Sahu
 
A5: Security Misconfiguration
Tariq Islam
 
Security testing fundamentals
Cygnet Infotech
 
Web tools ppt
Tamara Pia Agavi
 
Step by step guide for web application security testing
Avyaan, Web Security Company in India
 
Owasp top 10 vulnerabilities
OWASP Delhi
 
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
 
Hacker Halted Miami , USA 2010
Aditya K Sood
 
OWASP Khartoum Top 10 A4 - 7th meeting
OWASP Khartoum
 
Identity Security - Azure Identity Protection
Eng Teong Cheah
 
Detecting Ransomware/Bot Infections in Elasticsearch
Aditya K Sood
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
 
Owasp top 10 2017
ibrahimumer2
 
Security Testing Training With Examples
Alwin Thayyil
 
Microservices Security
Aditi Anand
 
Owasp top 10 security threats
Vishal Kumar
 
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
All Things Open
 

Viewers also liked (6)

PDF
Logic Apps y las posibilidades de Integración Cloud (por Felipe Senso, de Mic...
Jorge Millán Cabrera
 
PDF
API Management: La Puerta de enlace (por Francisco Nieto)
Jorge Millán Cabrera
 
PDF
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
Jorge Millán Cabrera
 
PDF
DevTest Labs en Azure (por Iván Cañizares)
Jorge Millán Cabrera
 
PDF
BizTalk Server 2016: What's new (por Mariano Robles)
Jorge Millán Cabrera
 
PDF
Logic Apps: El Poder de la nueva Integración (por Félix Mondelo)
Jorge Millán Cabrera
 
Logic Apps y las posibilidades de Integración Cloud (por Felipe Senso, de Mic...
Jorge Millán Cabrera
 
API Management: La Puerta de enlace (por Francisco Nieto)
Jorge Millán Cabrera
 
Un orquestador en la nube: Azure Data Factory (por Carlos Sacristán)
Jorge Millán Cabrera
 
DevTest Labs en Azure (por Iván Cañizares)
Jorge Millán Cabrera
 
BizTalk Server 2016: What's new (por Mariano Robles)
Jorge Millán Cabrera
 
Logic Apps: El Poder de la nueva Integración (por Félix Mondelo)
Jorge Millán Cabrera
 

Similar to Prevent Malicious Hacking Attacks on your APIs (20)

PDF
Secure coding guidelines
Zakaria SMAHI
 
PPT
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
IBM Security
 
PPT
Cyber security
Sakib Sami
 
PPTX
How to Detect SQL Injections & XSS Attacks with AlienVault USM
AlienVault
 
PPTX
Application Security Vulnerabilities: OWASP Top 10 -2007
Vaibhav Gupta
 
PPT
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
PPTX
Security testing
Khizra Sammad
 
PPTX
Security risks awareness
Janagi Kannan
 
PPTX
Injection flaws
DANISH INAMDAR
 
PDF
An Anatomy of a SQL Injection Attack
Imperva
 
PDF
Drupal Security Basics for the DrupalJax January Meetup
Chris Hales
 
PDF
Web Application Security 101
Cybersecurity Education and Research Centre
 
PPTX
Data base security and injection
A. Shamel
 
PDF
C01461422
IOSR Journals
 
PPT
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
Kaukau9
 
PPT
Secure by design and secure software development
Bill Ross
 
PPT
DEVSECOPS_the_beginning.ppt
schwarz10
 
PPTX
Ethical Hacking Techniques for Web Application Security
Boston Institute of Analytics
 
PPTX
Domain 5 of the CEH Web Application Hacking.pptx
Infosectrain3
 
PPT
Get Ready for Web Application Security Testing
Alan Kan
 
Secure coding guidelines
Zakaria SMAHI
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
IBM Security
 
Cyber security
Sakib Sami
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
AlienVault
 
Application Security Vulnerabilities: OWASP Top 10 -2007
Vaibhav Gupta
 
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
Security testing
Khizra Sammad
 
Security risks awareness
Janagi Kannan
 
Injection flaws
DANISH INAMDAR
 
An Anatomy of a SQL Injection Attack
Imperva
 
Drupal Security Basics for the DrupalJax January Meetup
Chris Hales
 
Web Application Security 101
Cybersecurity Education and Research Centre
 
Data base security and injection
A. Shamel
 
C01461422
IOSR Journals
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
Kaukau9
 
Secure by design and secure software development
Bill Ross
 
DEVSECOPS_the_beginning.ppt
schwarz10
 
Ethical Hacking Techniques for Web Application Security
Boston Institute of Analytics
 
Domain 5 of the CEH Web Application Hacking.pptx
Infosectrain3
 
Get Ready for Web Application Security Testing
Alan Kan
 

More from SmartBear (20)

PPTX
Enforcing Your Organization's API Design Standards with SwaggerHub
SmartBear
 
PPTX
Introducing OpenAPI Version 3.1
SmartBear
 
PPTX
IATA Open Air: How API Standardization Enables Innovation in the Airline Indu...
SmartBear
 
PPTX
The State of API 2020 Webinar – Exploring Trends, Tools & Takeaways to Drive ...
SmartBear
 
PPTX
How LISI Automotive Accelerated Application Delivery with SwaggerHub
SmartBear
 
PPTX
Standardising APIs: Powering the Platform Economy in Financial Services
SmartBear
 
PPTX
Getting Started with API Standardization in SwaggerHub
SmartBear
 
PPTX
Adopting a Design-First Approach to API Development with SwaggerHub
SmartBear
 
PPTX
Standardizing APIs Across Your Organization with Swagger and OAS | A SmartBea...
SmartBear
 
PPTX
Effective API Lifecycle Management
SmartBear
 
PDF
The API Lifecycle Series: Exploring Design-First and Code-First Approaches to...
SmartBear
 
PDF
The API Lifecycle Series: Evolving API Development and Testing from Open Sour...
SmartBear
 
PPTX
Artificial intelligence for faster and smarter software testing - Galway Mee...
SmartBear
 
PDF
Successfully Implementing BDD in an Agile World
SmartBear
 
PPTX
The Best Kept Secrets of Code Review | SmartBear Webinar
SmartBear
 
PPTX
How Capital One Scaled API Design to Deliver New Products Faster
SmartBear
 
PPTX
Testing Without a GUI Using TestComplete
SmartBear
 
PPTX
Hidden Treasure - TestComplete Script Extensions
SmartBear
 
PDF
How Bdd Can Save Agile
SmartBear
 
PPTX
API Automation and TDD to Implement Master Data Survivorship Rules
SmartBear
 
Enforcing Your Organization's API Design Standards with SwaggerHub
SmartBear
 
Introducing OpenAPI Version 3.1
SmartBear
 
IATA Open Air: How API Standardization Enables Innovation in the Airline Indu...
SmartBear
 
The State of API 2020 Webinar – Exploring Trends, Tools & Takeaways to Drive ...
SmartBear
 
How LISI Automotive Accelerated Application Delivery with SwaggerHub
SmartBear
 
Standardising APIs: Powering the Platform Economy in Financial Services
SmartBear
 
Getting Started with API Standardization in SwaggerHub
SmartBear
 
Adopting a Design-First Approach to API Development with SwaggerHub
SmartBear
 
Standardizing APIs Across Your Organization with Swagger and OAS | A SmartBea...
SmartBear
 
Effective API Lifecycle Management
SmartBear
 
The API Lifecycle Series: Exploring Design-First and Code-First Approaches to...
SmartBear
 
The API Lifecycle Series: Evolving API Development and Testing from Open Sour...
SmartBear
 
Artificial intelligence for faster and smarter software testing - Galway Mee...
SmartBear
 
Successfully Implementing BDD in an Agile World
SmartBear
 
The Best Kept Secrets of Code Review | SmartBear Webinar
SmartBear
 
How Capital One Scaled API Design to Deliver New Products Faster
SmartBear
 
Testing Without a GUI Using TestComplete
SmartBear
 
Hidden Treasure - TestComplete Script Extensions
SmartBear
 
How Bdd Can Save Agile
SmartBear
 
API Automation and TDD to Implement Master Data Survivorship Rules
SmartBear
 

Recently uploaded (20)

PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PDF
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
PDF
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
PPT
Activate_Methodology_Summary presentatio
annapureddyn
 
PPTX
Role Of Python In Programing Language.pptx
jaykoshti048
 
PDF
Appium Automation Testing Tutorial PDF: Learn Mobile Testing in 7 Days
jamescantor38
 
PPTX
PFAS Reporting Requirements 2026 Are You Submission Ready Certivo.pptx
Certivo Inc
 
PDF
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
PDF
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
PDF
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
PDF
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
PPTX
oapresentation.pptx
mehatdhavalrajubhai
 
PPTX
Explanation about Structures in C language.pptx
Veeral Rathod
 
PDF
Generating Union types w/ Static Analysis
K. Matthew Dupree
 
PPTX
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
PPTX
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Version 1 Analytics
 
PDF
Exploring AI Agents in Process Industries
amoreira6
 
PPTX
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
PPTX
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
PDF
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
Activate_Methodology_Summary presentatio
annapureddyn
 
Role Of Python In Programing Language.pptx
jaykoshti048
 
Appium Automation Testing Tutorial PDF: Learn Mobile Testing in 7 Days
jamescantor38
 
PFAS Reporting Requirements 2026 Are You Submission Ready Certivo.pptx
Certivo Inc
 
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
oapresentation.pptx
mehatdhavalrajubhai
 
Explanation about Structures in C language.pptx
Veeral Rathod
 
Generating Union types w/ Static Analysis
K. Matthew Dupree
 
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Version 1 Analytics
 
Exploring AI Agents in Process Industries
amoreira6
 
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 

Prevent Malicious Hacking Attacks on your APIs

  • 1. Prevent Malicious Hacking attacks on your APIs Michael Giller @GillerMichael
  • 2. @GillerMichael Security Scans Overview - Injection  SQL Injection:  tries to exploit bad database integration coding  XPath Injection:  tries to exploit bad XML processing inside your target service
  • 3. @GillerMichael Security Scans Overview - Injection  Code Injection:  Watch out for those eval() functions!  Log Injection  Could be used to stir up false alarms  XML External Entity Injection  Vulnerabilities in XML parsing
  • 4. @GillerMichael Security Scans Overview - XSS  Cross Site Scripting (XSS):  enables attackers to inject client-side script into Web pages viewed by other users.  Used to bypass same origin policy  Could be used to plant a Trojan horse, get full access to user cookies and history, etc
  • 5. @GillerMichael Security Scans Overview - DoS  Denial-of-Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users – E.g. CyberBunker launched an all-out assault, on a spam-fighting company Spamhaus
  • 6. @GillerMichael Security Scans Overview  Check user permissions:  Make sure that your users can only access the information they need to access  Watch out for sequential IDs
  • 7. @GillerMichael Security Scans Overview (Cont.)  Malformed XML:  tries to exploit bad handling of invalid XML on your server or in your service  XML Bomb :  tries to exploit bad handling of malicious XML request (be careful)  Malicious Attachment:  tries to exploit bad handling of attached files
  • 8. @GillerMichael Security Scans Overview (Cont.)  Fuzzing Scan:  generates random input for specified request parameters for a specified number of requests  Custom Script:  allows you to use a script for generating custom parameter fuzzing values
  • 9. References: @GillerMichael • SoapUI team had a great informational “Better Safe Than Sony” webinar discussing security. You can watch it here:  http://www.soapui.org/soapUI-News/watch-yesterdays- webinar.html • Open Web Application Security Project (OWASP) published top 10 most common types of attacks here:  https://www.owasp.org/index.php/OWASP_Top_Ten_Cheat_Sheet • Here’s the attacks particular to REST:  https://www.owasp.org/index.php/REST_Security_Cheat_Sheet

Editor's Notes

  • #3: Injection attack is by far the most likely and common type of attack hackers are likely to attempt to explore vulnerabilities in your API. This slide talks about different classes of attacks people may send against your API parameters. To test how your APIs behave against these attacks, you can use SoapUI’s Security feature as shown here - http://www.soapui.org/Security/getting-started.html
  • #4: Injection attack is by far the most likely and common type of attack hackers are likely to attempt to explore vulnerabilities in your API. This slide talks about different classes of attacks people may send against your API parameters. To test how your APIs behave against these attacks, you can use SoapUI’s Security feature as shown here - http://www.soapui.org/Security/getting-started.html
  • #5: Cross-site scripting (XSS) enables attackers to inject client-side script into your applications so that XSS script can be viewed by other users. XSS may be used by attackers to bypass access controls such as the same origin policy. This type of security attack is becoming more and more popular in recent years. Prevent this with SoapUI’s Cross Side Scripting test - http://www.soapui.org/Security/cross-site-scripting.html
  • #6: You can mimic denial-of-service (DoS) by creating a load test. Either in SoapUI (http://www.soapui.org/Getting-Started/load-testing.html) or in our integration with LoadUI (http://www.loadui.com/Load-Testing-soapUI-Tests/getting-started-with-soapui-integration.html)
  • #7: This can be tested with a functional test case where you can string steps together. E.g.: Login as User 1, Post data, Logout User 1. Login as User 2, try to get User 1’s data, check that you cannot To string API calls together, see - http://www.soapui.org/Working-with-soapUI/point-and-click-testing.html
  • #8: These can be tested with SoapUI security tests: Malformed XML: http://www.soapui.org/Security/malformed-xml.html XML Bomb: http://www.soapui.org/Security/xml-bomb.html Malicious Attachment: http://www.soapui.org/Security/malicious-attachment.html
  • #9: These can be tested with SoapUI security tests: Fuzzing Scan: http://www.soapui.org/Security/fuzzing-scan.html Custom Scan: http://www.soapui.org/Security/script-custom-scan.html (If you can think of Security Tests outside of configurable offered scans, you can still use the framework to compose your own vulnerability checks)