#hackervlog #api #cybersecurity
Use case
Unprotected APIs that are considered “internal”
Weak authentication that does not follow industry best practices
Weak API keys that are not rotated
Passwords that are weak, plain text, encrypted, poorly hashed, shared, or default passwords
Authentication susceptible to brute force attacks and credential stuffing
Credentials and keys included in URLs
Lack of access token validation (including JWT validation)
Unsigned or weakly signed non-expiring JWTs
How to prevent
Check all possible ways to authenticate to all APIs.
APIs for password reset and one-time links also allow users to authenticate, and should be protected just as rigorously.
Use standard authentication, token generation, password storage, and multi-factor authentication (MFA).
Use short-lived access tokens.
Authenticate your apps (so you know who is talking to you).
Use stricter rate-limiting for authentication, and implement lockout policies and weak password checks.
Application programming interface security testing helps you identify owasp top 10 for API vulnerabilities in any web application. API Security Testing is a very essential skills for every penetration tester to learn how to test any API with security flaws.
This series API testing in hindi helps you to learn owasp top 10 especially designed for API's. In this series we will be covered owasp top 10 for API in 10 videos in hindi.
Our series will help you understand how in cyber security industry any penetration tester test the web API. List of software that we will use in this series are as follows:
Postman: https://www.postman.com/downloads/
Burp Suite: https://portswigger.net/burp/communit...
_____________________________________________________________________________________________________
👉Campus Ambassador Form: https://forms.gle/eRxUorkSUDf9Y2nC9
🤩New Channel (Hacker Vlog Live): / @hackervloglive
👉Download ASD Academy App📲: https://play.google.com/store/apps/de...
👇For Collaboration/Unboxing Video/Sponsorship/Free Seminar/Free Workshop email us at [email protected]
👇Join this channel to get access to perks:
/ @hackervlog
___________________________________________________________________________________
*Stay Connected with us*
👇Do you have any Questions? Ask your Enquiry and Interact Live 1:1 with our Experts (Mr. Tapan Kumar Jha & Miss. Riddhi Soral)
https://b24-013snh.bitrix24.site/crm_...
👇Learn Free Courses at:
/ hackervlog
👇Do you want to Join *Free Cyber Security Internship*?
https://forms.gle/BnjeePtijEvhRb1eA
👇Fill below form to join "Hacker Meet":-
https://docs.google.com/forms/d/e/1FA...
👇 For Cyber Security & Coding Diploma/Courses Enquiry Visit:
http://www.asdacademy.in
👇Join our Telegram Group:-
https://t.me/+yOTVYULGzlljYzM9
👇Follow us on Twitter:
/ vlog_hacker
👇Follow us on *Instagram*:
/ hackervlogofficial
👇Download Free Cyber Security Software at:
https://www.hackingtool.in
👇Report Free Cyber Crime at:
http://www.cybercert.in
Intro Music credits-
Disclaimer:-
This video is made available for educational and informational purposes only. We believe that everyone must be aware of ethical hacking and cyber security to avoid different types of cyberattacks on computers, websites, apps, etc. Please regards the word hacking as ethical hacking everytime we use it.
All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. Hacker Vlog is not responsible for any misuse of the provided information.