API-Security
wstg
Our great sponsors
API-Security | wstg | |
---|---|---|
15 | 27 | |
1,933 | 6,684 | |
1.8% | 3.5% | |
6.2 | 7.6 | |
11 days ago | 4 days ago | |
Dockerfile | Dockerfile | |
GNU General Public License v3.0 or later | Creative Commons Attribution Share Alike 4.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
API-Security
-
What's the problem with my API?
Check the top 10 API security by OWASP
-
Quick Privacy Question
In the end this is a security oversight known as excessive data exposure (OWASP - API3:2019) of Riot and as long as they keep sending this info people will be able to see it.
-
Implementing decent security
Check out ----, https://github.com/OWASP/API-Security
-
API without authentication severity?
If incorrect API authentication mechanisms implementation considered as Broken User Authentication, how severe the one without authentication at all? Critical? or high?
-
Feedbak for an article on API Security Maturity Model+
The OWASP top 10 API security risks are posted on their GitHub here. As OWASP shows, because APIs are open to the network:
-
API10:2019 - Insufficient Logging & Monitoring
More cases and prevention methods can be found on the OWASP API Security Top 10 official repository
- API9:2019 - Improper Assets Management
- API8:2019 - Injection
-
API7:2019 - Security Misconfiguration
OWASP API-Security repo
- API6:2019 - Mass Assignment
wstg
-
Where do you focus your time and energy?
At the beginning, I read all things in here https://owasp.org/www-project-web-security-testing-guide/, also gets familiars with owasp top 10. But later on, I focus on a few techniques only.
-
XSS
I highly recommend PortSwigger's Web Security Academy and have a look at the OWASP Web Security Testing Guide.
- Como identificar vulnerabilidades no código fonte?
- Internal pentesting course
-
I need some Help
You can follow OWASP web testing guide to learn about the test cases performed during testing.
-
Ask HN: Fallback remote job options for an experienced developer in the U.S.?
Most web app testing is performed using this guide https://owasp.org/www-project-web-security-testing-guide/
- Which security strategies can you recommend?
-
Pentest on web app priority
I highly recommend the OWASP Testing Guide: https://owasp.org/www-project-web-security-testing-guide/
-
Web App Pentesting Career
Hi, sit and learn https://owasp.org/www-project-web-security-testing-guide/ that's the best way, than may be EJPT.
-
Git branching for small teams
A short-lived branch-per-issue helps ensure that its resulting pull request doesn’t get too large, making it unwieldy and hard to review carefully. The definition of “short” varies depending on the team or project’s development velocity: for a small team producing a commercial app (like a startup), the time from issue branch creation to PR probably won’t exceed a week. For open source projects like the OWASP WSTG that depends on volunteers working around busy schedules, branches may live for a few weeks to a few months, depending on the contributor. Generally, strive to iterate in as little time as possible.
What are some alternatives?
API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API
OWASP-Testing-Checklist - OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.
bugbounty-cheatsheet - A list of interesting payloads, tips and tricks for bug bounty hunters.
owasp-masvs - The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.
Security_Engineer_Interview_Questions - Every Security Engineer Interview Question From Glassdoor.com
offensiveinterview - Interview questions to screen offensive (red team/pentest) candidates
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Interview_Tips - Summary of Cyber Security interview questions I have been through, hope this helps
rift-explorer - 🛠 Explore the API of the League of Legends client
Damn-Vulnerable-Bank - Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.