YoVDO

Hack Your APIs in 15 Minutes or Less - Exploiting Shadow APIs and Data Vulnerabilities

Offered By: OWASP Foundation via YouTube

Tags

API Security Courses Cybersecurity Courses Machine Learning Courses Encryption Courses Data Breaches Courses Vulnerability Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover how hackers exploit Shadow APIs to extract massive amounts of data in this 26-minute conference talk. Learn about a simple yet often overlooked vulnerability in data security and explore creative methods employed by hackers to steal large volumes of information. Gain insights into defeating machine learning, API security challenges, and real-world examples of misconfigured APIs. Explore the process of decrypting apps, detecting APIs, and understanding the science behind hacking tools. Delve into topics such as research vs. hacking, API security in the news, and notable data breaches. By the end of this presentation, grasp the fundamentals of API exploitation and develop a better understanding of how to protect against these threats.

Syllabus

Intro
Hack in 15 Minutes or Less
What do hackers do
Research vs Hacking
How to defeat Machine Learning
Construction worker example
API security
API security in the news
API security in Australia
Same attack different app
misconfigured APIs
how did this happen
Decrypting the app
Detecting APIs
The Clever Part
Data Breaches
Science of the Tools
Conclusion


Taught by

OWASP Foundation

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network