Главная
Study mode:
on
1
Intro
2
Hack in 15 Minutes or Less
3
What do hackers do
4
Research vs Hacking
5
How to defeat Machine Learning
6
Construction worker example
7
API security
8
API security in the news
9
API security in Australia
10
Same attack different app
11
misconfigured APIs
12
how did this happen
13
Decrypting the app
14
Detecting APIs
15
The Clever Part
16
Data Breaches
17
Science of the Tools
18
Conclusion
Description:
Discover how hackers exploit Shadow APIs to extract massive amounts of data in this 26-minute conference talk. Learn about a simple yet often overlooked vulnerability in data security and explore creative methods employed by hackers to steal large volumes of information. Gain insights into defeating machine learning, API security challenges, and real-world examples of misconfigured APIs. Explore the process of decrypting apps, detecting APIs, and understanding the science behind hacking tools. Delve into topics such as research vs. hacking, API security in the news, and notable data breaches. By the end of this presentation, grasp the fundamentals of API exploitation and develop a better understanding of how to protect against these threats.

Hack Your APIs in 15 Minutes or Less - Exploiting Shadow APIs and Data Vulnerabilities

OWASP Foundation
Add to list