SlideShare a Scribd company logo
Learn from the Past
Secure the Present
Plan for the Future
API Vulnerabilities
©
Noname
Security.
All
rights
reserved.
2
It's Great to Meet You
Hila Zigman, VP Product
Noname Security
Background
01.
©
Noname
Security.
All
rights
reserved.
The Traditional Exploitation - “Implementation” Vulnerabilities
Mostly common in
C, C++
Exploits Kernels, Web
Browsers, Media
Players and etc..
Requires deep
understanding of the
compiler
01 02 03
©
Noname
Security.
All
rights
reserved.
5
Vulnerability Example
©
Noname
Security.
All
rights
reserved.
6
Vulnerability Example
©
Noname
Security.
All
rights
reserved.
7
Real World Examples
©
Noname
Security.
All
rights
reserved.
Code Execution Mitigations - Ever Increasing Complexity
2004
Dep - Windows XP Service
Pack 2
2005
2008
ASLR
2012
2015
Sandbox technologies
Windows Kernel ASLR
Seccomp / SE Linux and
other zero trust technologies
Stack Canary
2017
©
Noname
Security.
All
rights
reserved.
Design / Logical Flaws
There is no
dependence on
programming
languages
Requires deep
understanding of the
application’s logic or
environment
Usually a very short
exploitation time
01 02 03
©
Noname
Security.
All
rights
reserved.
10
Vulnerability Example
©
Noname
Security.
All
rights
reserved.
11
Vulnerability Example
Empty
Password
©
Noname
Security.
All
rights
reserved.
12
Real World Examples
©
Noname
Security.
All
rights
reserved.
13
The Attacker’s Fundamental Equation
Attack surface
Likelihood
of
a
vulnerability
APIs as an Attack Surface
02.
©
Noname
Security.
All
rights
reserved.
15
APIs as Structured Data
HTML JSON
©
Noname
Security.
All
rights
reserved.
16
APIs Evolution - Direct Proxy to The Data and Controls
SOAP REST
©
Noname
Security.
All
rights
reserved.
17
APIs Evolution - Direct Proxy to The Data and Controls
GraphQL
©
Noname
Security.
All
rights
reserved.
18
APIs Growth
Month
Total
API
Count
Jan
2006
Jan
2008
Jan
2010
Jan
2012
Jan
2014
Jan
2016
Jan
2018
0
4000
8000
12000
20000
16000
©
Noname
Security.
All
rights
reserved.
19
APIs Sprawl
©
Noname
Security.
All
rights
reserved.
20
APIs Configuration Example
©
Noname
Security.
All
rights
reserved.
21
By 2022, API abuses will become the
most-frequent attack vector.
Public API policies represented a significant
security gap. Two-thirds of the incidents
analyzed involved improperly configured APIs
APIs Are a Top Attack Vector
Real World Examples
03.
©
Noname
Security.
All
rights
reserved.
23
Broken Authorization - Facebook (06/05/2021)
©
Noname
Security.
All
rights
reserved.
24
Broken Authorization - Coinbase (02/22/2022)
©
Noname
Security.
All
rights
reserved.
25
Broken Authentication - Peloton (05/2/2021)
©
Noname
Security.
All
rights
reserved.
26
Excessive Data Exposure - 7-Eleven (07/12/2019)
What Can Be Done
04.
©
Noname
Security.
All
rights
reserved.
What Do We Aspire
Every API will be
built according to
the way it was
designed
Every API will be used
the way it was
intended
01 02
©
Noname
Security.
All
rights
reserved.
How It Can Be Done
1. Document any API in a swagger document or a spec file and make sure its aligned with
the organization policy
2. Built any API according to the spec file and test it for vulnerabilities or undesired
behavior
3. Deploy any API according to the organization’s policy. Leverage API Gateways and WAFs
to insure authentication, rate limiting, DOS protection and etc..
4. Protect the APIs in real time, discover and block malicious users, rouge APIs and etc.
©
Noname
Security.
All
rights
reserved.
30
Look at The Four Components of APIs
Traffic Code
Documentation
Environment
API
©
Noname
Security.
All
rights
reserved.
31
API Security Scope
Posture
Management
Inventory every API and
Identify API security
vulnerabilities
Runtime Security
Detection and prevention of
attackers and suspicious
behavior in real time
APIs SDLC
Continuously test APIs to
identify API security risks
before they emerge.
©
2021
Noname
Security.
All
rights
reserved.
32
Noname’s 360 Degrees of Security Coverage
Assess every API, including
legacy and shadow APIs, with
data classification.
Identify misconfigurations and
vulnerabilities in source code,
network configuration and policy.
Runtime Security
Behavioral-based models for
runtime API threat detection.
Automated and semi-automated
blocking and remediation of
threats.
Secure SDLC
Continuously test API
endpoints to identify API risks
before they emerge.
Automated and dynamic test
development and incorporation
into CI/CD pipelines.
Posture Management
© Noname Security. All rights reserved.
Thank You
©
Noname
Security.
All
rights
reserved.
Noname Reference Architecture
Workflow Integrations
34
Network and Cloud
API Gateway
Leverage APIs and Native Network Traffic and Gateway Services
Development Platforms
Flexible Engine Deployment
on-premise, hybrid or SaaS
(single tenant)
Posture
Attack
Prevention
Testing
©
Noname
Security.
All
rights
reserved.
35
The Traditional Exploitation - “Implementation” Vulnerabilities
● Mostly common in C, C++
● Exploits Kernels, Web Browsers, Media Players and etc..
● Requires deep understanding of the compiler
©
Noname
Security.
All
rights
reserved.
36
A “Good” API
● Exact scope
● Scope correlates to spec
● Managed by an API-GW
● Active
● Unique
● Serves a specific role
● Organizational requirements are enforced
● Authenticated
● Load balanced and Rate limited
● WAF defended
©
Noname
Security.
All
rights
reserved.
37
Rogue API - Types
● The unmanaged API
● The deprecated API
● The dormant API
● The duplicated API
● The “unknown” API
● The unauthenticated API
● The wrongful scope API
● The misrouted API
©
Noname
Security.
All
rights
reserved.
38
Security Through The Entire Life Cycle
©
Noname
Security.
All
rights
reserved.
39
Secure The Environment
Inventory Ass the Risk
Protect the
Production
Secure Any New
Release
©
Noname
Security.
All
rights
reserved.
40
Broken Authorization - Run Time Issue
Request Response
©
Noname
Security.
All
rights
reserved.
Request Response
41
Broken Authorization - Run Time Issue
©
Noname
Security.
All
rights
reserved.
42
Broken Authorization - Run Time Issue
Request Response
©
Noname
Security.
All
rights
reserved.
Request Response
43
Broken Authorization - Run Time Issue
©
Noname
Security.
All
rights
reserved.
Request Response
44
Broken Authorization - Run Time Issue
©
Noname
Security.
All
rights
reserved.
45
Broken Authorization - Run Time Issue
Request Response
Request Response
©
Noname
Security.
All
rights
reserved.
46
Broken Authorization - Run Time Issue
Request Response
Request Response
©
Noname
Security.
All
rights
reserved.
47
Lack of Automation
©
Noname
Security.
All
rights
reserved.
48
Broken Authentication - (02/15/2021)

More Related Content

PDF
Threat Modeling Everything
PDF
Securing DevOps through Privileged Access Management
PDF
2022 APIsecure_Shift Left API Security - The Right Way
PPTX
Application Security Architecture and Threat Modelling
PPTX
Threat modeling web application: a case study
PPTX
Introduction to Web Application Penetration Testing
PPTX
Threat modelling with_sample_application
Threat Modeling Everything
Securing DevOps through Privileged Access Management
2022 APIsecure_Shift Left API Security - The Right Way
Application Security Architecture and Threat Modelling
Threat modeling web application: a case study
Introduction to Web Application Penetration Testing
Threat modelling with_sample_application

What's hot (20)

PPTX
AppSec DC 2019 ASVS 4.0 Final.pptx
PDF
Iso 27001
PPTX
Security Operations Center (SOC) Essentials for the SME
PDF
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
PDF
Customer identity and access management (ciam)
PPTX
Security Information and Event Management (SIEM)
PPTX
2022 APIsecure_The Real World, API Security Edition
PDF
Scalable threat modelling with risk patterns
PPTX
Vapt( vulnerabilty and penetration testing ) services
PDF
Value proposition of SSI tech providers - Self-Sovereign Identity
PPTX
Analysis of web application penetration testing
PDF
Mender; the open-source software update solution
PPTX
WHY SOC Services needed?
PPTX
Domain 5 - Identity and Access Management
PDF
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
PDF
THOR Apt Scanner
PPTX
How to implement NIST cybersecurity standards in my organization
PPTX
Web Application Penetration Testing Introduction
PDF
Peeling the Onion: Making Sense of the Layers of API Security
PDF
The Five Pillars of Customer Identity and Access Management (CIAM)
AppSec DC 2019 ASVS 4.0 Final.pptx
Iso 27001
Security Operations Center (SOC) Essentials for the SME
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
Customer identity and access management (ciam)
Security Information and Event Management (SIEM)
2022 APIsecure_The Real World, API Security Edition
Scalable threat modelling with risk patterns
Vapt( vulnerabilty and penetration testing ) services
Value proposition of SSI tech providers - Self-Sovereign Identity
Analysis of web application penetration testing
Mender; the open-source software update solution
WHY SOC Services needed?
Domain 5 - Identity and Access Management
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
THOR Apt Scanner
How to implement NIST cybersecurity standards in my organization
Web Application Penetration Testing Introduction
Peeling the Onion: Making Sense of the Layers of API Security
The Five Pillars of Customer Identity and Access Management (CIAM)
Ad

Similar to 2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: API Vulnerabilities (20)

PDF
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
PDF
apidays New York 2023 - Putting yourself out there - how to secure your publi...
PDF
Hacking and Defending APIs - Red and Blue make Purple.pdf
PDF
The API Primer (OWASP AppSec Europe, May 2015)
PPTX
Apidays London 2024 - Securing APIs, Beyond the Basics with Advanced Security...
PDF
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
PDF
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
PDF
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
PDF
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
PDF
SecDevOps for API Security
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
PDF
411 Reference - API Standards and Repository.pdf
PDF
eb-The-State-of-API-Security.pdf
PDF
Better API Security with Automation
PDF
Better API Security With A SecDevOps Approach
PDF
Api economy and why effective security is important (1)
PDF
Guidelines to protect your APIs from threats
PDF
apidays Hong Kong - Attack API Architecture, Alvin Tam, Hong Kong Computer So...
PPTX
The Inconvenient Truth About API Security
PDF
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
apidays New York 2023 - Putting yourself out there - how to secure your publi...
Hacking and Defending APIs - Red and Blue make Purple.pdf
The API Primer (OWASP AppSec Europe, May 2015)
Apidays London 2024 - Securing APIs, Beyond the Basics with Advanced Security...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
SecDevOps for API Security
Outpost24 webinar Why API security matters and how to get it right.pdf
411 Reference - API Standards and Repository.pdf
eb-The-State-of-API-Security.pdf
Better API Security with Automation
Better API Security With A SecDevOps Approach
Api economy and why effective security is important (1)
Guidelines to protect your APIs from threats
apidays Hong Kong - Attack API Architecture, Alvin Tam, Hong Kong Computer So...
The Inconvenient Truth About API Security
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
Ad

More from APIsecure_ Official (20)

PDF
2022 APIsecure_A day in the life of an API; Fighting the odds
PDF
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
PDF
2022 APIsecure_Securing Large API Ecosystems
PDF
2022 APIsecure_Quarterly Review of API Vulnerabilities
PPTX
2022 APIsecure_Top Ten Security Tips for APIs
PPTX
2022 APIsecure_Are your APIs Rugged Enough?
PPTX
2022 APIsecure_Making webhook APIs secure for enterprise
PDF
2022 APIsecure_API Security & Fraud Detection - Are you ready?
PPTX
2022 APIsecure_Monitoring and Responding to API Breaches
PDF
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
PPTX
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
PPTX
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
PPTX
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
PPTX
2022 APIsecure_Hackers with Valid Credentials
PDF
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
PDF
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
PDF
2022 APIsecure_Harnessing the Speed of Innovation
PDF
2022 APIsecure_API Discovery: First step towards API Security
PPTX
2022 APIsecure_We’re Not in AppSec Anymore Toto
PPTX
2022 APIsecure_Anomaly detection is no longer a strategy
2022 APIsecure_A day in the life of an API; Fighting the odds
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Securing Large API Ecosystems
2022 APIsecure_Quarterly Review of API Vulnerabilities
2022 APIsecure_Top Ten Security Tips for APIs
2022 APIsecure_Are your APIs Rugged Enough?
2022 APIsecure_Making webhook APIs secure for enterprise
2022 APIsecure_API Security & Fraud Detection - Are you ready?
2022 APIsecure_Monitoring and Responding to API Breaches
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_Hackers with Valid Credentials
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_API Discovery: First step towards API Security
2022 APIsecure_We’re Not in AppSec Anymore Toto
2022 APIsecure_Anomaly detection is no longer a strategy

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
sap open course for s4hana steps from ECC to s4
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Machine learning based COVID-19 study performance prediction
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
Network Security Unit 5.pdf for BCA BBA.
Review of recent advances in non-invasive hemoglobin estimation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Understanding_Digital_Forensics_Presentation.pptx
Spectroscopy.pptx food analysis technology
MYSQL Presentation for SQL database connectivity
sap open course for s4hana steps from ECC to s4
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
Machine learning based COVID-19 study performance prediction
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Weekly Chronicles - August'25 Week I
The AUB Centre for AI in Media Proposal.docx
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: API Vulnerabilities