SlideShare a Scribd company logo
API Hijacking
By : Vishwas Narayan
API Security Practitioner,Community Advocate Opstree
Business
Logic
Easy
Attack
Vector
Know your Resources
โ— Don't Open Secrets in the API documentation
โ— Keep the API Docs in Email Authentication not
open
โ— Documents that say what is the API is until you
feel there is a new security patch that has to be
done
โ— Fix the API as soon as possible
Know your Situation
โ€œUnderstand what is the business logic
before you open the API that you feel its
secureโ€
Know your Adversary/Enemy
โ€œHack your APIโ€™s before hacker knows
how hack itโ€
โ— You need to know the next move
โ— You need to make moves before a
stranger makes it
OWASP Top 10 in API Security
1. Broken Object Level Authorization
2. Broken User Authentication
3. Excessive Data Exposure
4. Lack of Resources & Rate Limiting
5. Broken Function Level Authorization
6. Mass Assignment
7. Security Miscon๏ฌguration
8. Injection
9. Improper Assets Management
10. Insu๏ฌƒcient Logging & Monitoring
OWASP API Security Project | OWASP
Foundation
Summarising issues in API
โž” Authentication/Session Management
โž” Authorization/Access Control/IDOR
โž” Inputs and Output Validation/Error Handling
โž” Rate Limiting/Throttling
Let's worship this
โ— Global state of the internet security DDoS attack reports | Akamai
โ— How to send API key in the header of python request? - Stack Overflow
โ— Postman Sending Request onto the API
โ— Postman Sending AUTH token
โ— Automating the postman Calls
โ— Akamai State of the Internet Report
โ— Salt Security releases Salt Labs State of API Security Report, Q3 2022
DOMO Report 9.0
Data Never Sleeps 9.0 | Domo
API Hijacking.pdf
ALL report says one thing
you architect the api wrong way guess what world will show you how it can be
Common APIโ€™s
1. APIโ€™s
2. Open API
3. Public API
4. External API
5. Internal API
6. Swaggers
7. Rest API
8. SOAP
9. Graphql
10. Machine to Machine API
11. BETA ,Pre Production,Production API
12. Third Party
13. Composite API
Unknown APIโ€™s
1. Zombie API
2. Shadow API
3. Frankenstein API
API Hijacking.pdf
What is cURL and how does it relate to APIs?
- IBM Developer
The turtle and the Bunny (animation) by
VirtualSketcher on DeviantArt
dsopas/MindAPI: Organize your API security
assessment by using MindAPI. It's free and
open for community collaboration.
(github.com)
API Hijacking.pdf
API Hijacking.pdf
API Hijacking.pdf
API Hijacking.pdf
API Hijacking.pdf
API Hijacking.pdf
API Hijacking.pdf
API Hijacking.pdf
assetnote/kiterunner: Contextual Content
Discovery Tool (github.com)
MobSF/Mobile-Security-Framework-MobSF: Mobile Security Framework (MobSF) is
an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing,
malware analysis and security assessment framework capable of performing static
and dynamic analysis. (github.com)
Thank you lets go Handson

More Related Content

PDF
API Testing and Hacking (1).pdf
PDF
API Testing and Hacking.pdf
PDF
API Testing and Hacking.pdf
PDF
APIsecure 2023 - API First Hacking, Corey Ball, Author of Hacking APIs
ย 
PDF
apidays Hong Kong - Attack API Architecture, Alvin Tam, Hong Kong Computer So...
ย 
PDF
HowYourAPIBeMyAPI
PPTX
apidays Paris 2024 - Layered Approach of API Security Strategies and its Busi...
ย 
PDF
OWASPAPISecurity
API Testing and Hacking (1).pdf
API Testing and Hacking.pdf
API Testing and Hacking.pdf
APIsecure 2023 - API First Hacking, Corey Ball, Author of Hacking APIs
ย 
apidays Hong Kong - Attack API Architecture, Alvin Tam, Hong Kong Computer So...
ย 
HowYourAPIBeMyAPI
apidays Paris 2024 - Layered Approach of API Security Strategies and its Busi...
ย 
OWASPAPISecurity

Similar to API Hijacking.pdf (20)

PPTX
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
PDF
APISecurity_OWASP_MitigationGuide
PDF
Peeling the Onion: Making Sense of the Layers of API Security
PPTX
Outpost24 webinar - Api security
PPTX
Layered API Security: What Hackers Don't Want You To Know
PDF
Hacker vs AI
PDF
API Security Best Practices and Guidelines
ย 
PPTX
What Is an API? | API Security Explained | API Security Best Practices | Simp...
PDF
A REVIEW PAPER ON API MALWARE ANALYSIS AND FORENSICS
PDF
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
PDF
The API Primer (OWASP AppSec Europe, May 2015)
PPTX
Web API Security
PDF
Hacking and Defending APIs - Red and Blue make Purple.pdf
PDF
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
ย 
PDF
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSIยฎ
PDF
Space Camp :: Introduction to API Security
ย 
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
PDF
INTERFACE by apidays 2023 - Something Old, Something New, Colin Domoney, 42Cr...
ย 
PDF
Akamai_ API Security Best Practices - Real-world attacks and breaches
PDF
API Summit 2021: What to know before you start dating APIs.pdf
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
APISecurity_OWASP_MitigationGuide
Peeling the Onion: Making Sense of the Layers of API Security
Outpost24 webinar - Api security
Layered API Security: What Hackers Don't Want You To Know
Hacker vs AI
API Security Best Practices and Guidelines
ย 
What Is an API? | API Security Explained | API Security Best Practices | Simp...
A REVIEW PAPER ON API MALWARE ANALYSIS AND FORENSICS
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
The API Primer (OWASP AppSec Europe, May 2015)
Web API Security
Hacking and Defending APIs - Red and Blue make Purple.pdf
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
ย 
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSIยฎ
Space Camp :: Introduction to API Security
ย 
Outpost24 webinar Why API security matters and how to get it right.pdf
INTERFACE by apidays 2023 - Something Old, Something New, Colin Domoney, 42Cr...
ย 
Akamai_ API Security Best Practices - Real-world attacks and breaches
API Summit 2021: What to know before you start dating APIs.pdf
Ad

Recently uploaded (20)

PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
artificial intelligence overview of it and more
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
ย 
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
Digital Literacy And Online Safety on internet
PPTX
Internet___Basics___Styled_ presentation
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
Tenda Login Guide: Access Your Router in 5 Easy Steps
artificial intelligence overview of it and more
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
ย 
522797556-Unit-2-Temperature-measurement-1-1.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
SAP Ariba Sourcing PPT for learning material
Introuction about ICD -10 and ICD-11 PPT.pptx
Digital Literacy And Online Safety on internet
Internet___Basics___Styled_ presentation
INTERNET------BASICS-------UPDATED PPT PRESENTATION
QR Codes Qr codecodecodecodecocodedecodecode
Paper PDF World Game (s) Great Redesign.pdf
introduction about ICD -10 & ICD-11 ppt.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Module 1 - Cyber Law and Ethics 101.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
presentation_pfe-universite-molay-seltan.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
Ad

API Hijacking.pdf

  • 1. API Hijacking By : Vishwas Narayan API Security Practitioner,Community Advocate Opstree Business Logic Easy Attack Vector
  • 2. Know your Resources โ— Don't Open Secrets in the API documentation โ— Keep the API Docs in Email Authentication not open โ— Documents that say what is the API is until you feel there is a new security patch that has to be done โ— Fix the API as soon as possible
  • 3. Know your Situation โ€œUnderstand what is the business logic before you open the API that you feel its secureโ€
  • 4. Know your Adversary/Enemy โ€œHack your APIโ€™s before hacker knows how hack itโ€ โ— You need to know the next move โ— You need to make moves before a stranger makes it
  • 5. OWASP Top 10 in API Security 1. Broken Object Level Authorization 2. Broken User Authentication 3. Excessive Data Exposure 4. Lack of Resources & Rate Limiting 5. Broken Function Level Authorization 6. Mass Assignment 7. Security Miscon๏ฌguration 8. Injection 9. Improper Assets Management 10. Insu๏ฌƒcient Logging & Monitoring OWASP API Security Project | OWASP Foundation
  • 6. Summarising issues in API โž” Authentication/Session Management โž” Authorization/Access Control/IDOR โž” Inputs and Output Validation/Error Handling โž” Rate Limiting/Throttling
  • 7. Let's worship this โ— Global state of the internet security DDoS attack reports | Akamai โ— How to send API key in the header of python request? - Stack Overflow โ— Postman Sending Request onto the API โ— Postman Sending AUTH token โ— Automating the postman Calls โ— Akamai State of the Internet Report โ— Salt Security releases Salt Labs State of API Security Report, Q3 2022
  • 8. DOMO Report 9.0 Data Never Sleeps 9.0 | Domo
  • 10. ALL report says one thing you architect the api wrong way guess what world will show you how it can be
  • 11. Common APIโ€™s 1. APIโ€™s 2. Open API 3. Public API 4. External API 5. Internal API 6. Swaggers 7. Rest API 8. SOAP 9. Graphql 10. Machine to Machine API 11. BETA ,Pre Production,Production API 12. Third Party 13. Composite API
  • 12. Unknown APIโ€™s 1. Zombie API 2. Shadow API 3. Frankenstein API
  • 14. What is cURL and how does it relate to APIs? - IBM Developer The turtle and the Bunny (animation) by VirtualSketcher on DeviantArt
  • 15. dsopas/MindAPI: Organize your API security assessment by using MindAPI. It's free and open for community collaboration. (github.com)
  • 25. MobSF/Mobile-Security-Framework-MobSF: Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. (github.com)
  • 26. Thank you lets go Handson