Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть API4:2019 Lack of Resources & Rate Limiting | Practical Lab | 2022 | Kontra | ApplicationSecurity.io

  • HamadCyber
  • 2022-07-23
  • 523
API4:2019 Lack of Resources & Rate Limiting | Practical Lab | 2022 | Kontra | ApplicationSecurity.io
owaspowasp top 10owasp practicalowasp top 10 labowasp exampleowasp web apiapi security projectowasp 2019 apicrapikontraapplication securitylatest web securityweb securitywhat is api securityhow to secure web api'stest web api for securitytesting web apifind vulnerabilities in apihow to secure apicyber securityhackingbroken object level authorizationpracticalbolaapi 2019 owaspinsecure web apiexploit web apihow to exploit
  • ok logo

Скачать API4:2019 Lack of Resources & Rate Limiting | Practical Lab | 2022 | Kontra | ApplicationSecurity.io бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно API4:2019 Lack of Resources & Rate Limiting | Practical Lab | 2022 | Kontra | ApplicationSecurity.io или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку API4:2019 Lack of Resources & Rate Limiting | Practical Lab | 2022 | Kontra | ApplicationSecurity.io бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео API4:2019 Lack of Resources & Rate Limiting | Practical Lab | 2022 | Kontra | ApplicationSecurity.io

#masterspark #owasp_api_security #api_security #owasp
Threat agents/Attack vectors Security Weakness Impacts
API Specific : Exploitability 2 Prevalence 3 : Detectability 3 Technical 2 : Business Specific
Exploitation requires simple API requests. No authentication is required. Multiple concurrent requests can be performed from a single local computer or by using cloud computing resources. It’s common to find APIs that do not implement rate limiting or APIs where limits are not properly set. Exploitation may lead to DoS, making the API unresponsive or even unavailable.
Is the API Vulnerable?
API requests consume resources such as network, CPU, memory, and storage. The amount of resources required to satisfy a request greatly depends on the user input and endpoint business logic. Also, consider the fact that requests from multiple API clients compete for resources. An API is vulnerable if at least one of the following limits is missing or set inappropriately (e.g., too low/high):

Execution timeouts
Max allocable memory
Number of file descriptors
Number of processes
Request payload size (e.g., uploads)
Number of requests per client/resource
Number of records per page to return in a single request response
Example Attack Scenarios
Scenario #1
An attacker uploads a large image by issuing a POST request to /api/v1/images. When the upload is complete, the API creates multiple thumbnails with different sizes. Due to the size of the uploaded image, available memory is exhausted during the creation of thumbnails and the API becomes unresponsive.

Scenario #2
We have an application that contains the users' list on a UI with a limit of 200 users per page. The users' list is retrieved from the server using the following query: /api/users?page=1&size=200. An attacker changes the size parameter to 200 000, causing performance issues on the database. Meanwhile, the API becomes unresponsive and is unable to handle further requests from this or any other clients (aka DoS).

The same scenario might be used to provoke Integer Overflow or Buffer Overflow errors.

How To Prevent
Docker makes it easy to limit memory, CPU, number of restarts, file descriptors, and processes.
Implement a limit on how often a client can call the API within a defined timeframe.
Notify the client when the limit is exceeded by providing the limit number and the time at which the limit will be reset.
Add proper server-side validation for query string and request body parameters, specifically the one that controls the number of records to be returned in the response.
Define and enforce maximum size of data on all incoming parameters and payloads such as maximum length for strings and maximum number of elements in arrays.

Комментарии

Информация по комментариям в разработке

Похожие видео

  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]