Introduction To API Security
Introduction To API Security
• APIs are beneficial because they allow developers to add specific functionality to
an application, without having to write all of the code themselves,
• When you’re designing new tools and products—or managing existing ones—
APIs give you flexibility; simplify design, administration, and use; and provide
opportunities for innovation.
IE2062 | Web Security | Introduction to API Security|
An API is an alternative to the user interface
• The APP may outsource requirements for data or functionality through API by
“calling” that API
Patient Record
Location represented as pin on a map
The execution of a financial transaction
• Web Apps
• Desktop Apps
• Server Apps
• Mobile Apps
❖ Partner APIs:
• Product
❖ Internal APIs:
• Standard
• System / Embedded
• GraphQL
• Browser/Native
• An API protocol defines the rules for API calls: it specifies accepted data types and commands.
REST
• REST (representational state transfer) is a very popular web API architecture. To be a REST API, an
• Client-server architecture: the interface is separated from the backend and data storage. This
allows for flexibility, and for different components to evolve independent of each other.
• Aggregate API
• Microservice API
• Input Validation
• Rate Limiting
These include :
• Improper parameterization of requests within application logic
• Lack of input sanitization
• Insufficient controls for data types passed (file upload bugs, Unicode
bugs)
• APIs are built to support a number of HTTP methods. Determining what the
application supports are very important when fuzzing the API.
• Sometime the scope of specific methods is too board, leading a user to be able to
PUT, DELETE, POST, etc parts of the API that it shouldn’t.
• Request Splitting
• Geo Filtering
• Filter Bots from your Single Page Applications and Browser APIs
• OAuth 2.0