Preventing Mobile App and API Abuse
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Explosion in Mobile Attacks
APIs Open New Business Opportunities and
Instagram API Attack
Ship Raider Shipper's Edge
App Identity using API keys
Keeping Secrets: Attack Surfaces
Don't Publish Your Keys
How Ship Raider Stole the API key
Detect and Block Abnormal Usage of APIs
Rate Limiting and Load Shedding
Behavioral API Security
Breaking TLS
Certificate Pinning
Pinning Upkeep
Remove Secret from the Channel
How ShipRaider Broke the HMAC
Calculate Secret at Runtime
Ship Raider Steals Runtime Secret
App Hardening Approaches
OAuth2 Overview
Abstract Protocol Flow
User's Outh2 Code Grant Flow
OAuth2 Refresh Tokens
OAuth2 Proof of Key Code Exchange (PKCE)
API Proxy Pattern
Secret as a Service
App Integrity Measurement
Strengthening OAuth2 Flow
ShipShape
Architecture Pattern
Conclusion
Taught by
OWASP Foundation
Related Courses
Web Authentication With Golang - Google's Go LanguageUdemy Jupyter Hub - Teaching Crypto - Hashing
Bill Buchanan OBE via YouTube API Abuse through Mobile Apps - New Attacks, New Defenses
RSA Conference via YouTube Authentication as a Microservice - Portable Customer Identity Management
OWASP Foundation via YouTube Might As Well JUMP - Exploit Development For Java Serialization
Hack In The Box Security Conference via YouTube