An Overview of API Underprotection

An Overview of API Underprotection

OWASP Foundation via YouTube Direct link

Intro

1 of 21

1 of 21

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

An Overview of API Underprotection

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 API Transformation
  3. 3 Security Landscape
  4. 4 The Journey of Complexity
  5. 5 Examples of Attacks
  6. 6 Pokemon Go
  7. 7 Reverse Engineering
  8. 8 Potential Risks
  9. 9 Traditional Defenses
  10. 10 Rate Limiting
  11. 11 OAuth2 Flow
  12. 12 User Agent Flow
  13. 13 API Permissions
  14. 14 API Keys Software Identity
  15. 15 Simple API Keys
  16. 16 Attack Surfaces
  17. 17 Trust Store
  18. 18 Pinning
  19. 19 Whitebox Cryptography
  20. 20 Remote attestation
  21. 21 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.