seguran a em apis rest heitor vital
play

Segurana em APIs REST Heitor Vital reas de Atuao o Cloud - PowerPoint PPT Presentation

Segurana em APIs REST Heitor Vital reas de Atuao o Cloud Computing twitter.com/heitorvital o Segurana Informao o Jogos slideshare.net/HeitorVital o Dispositivos Mveis o labs.siteblindado.com


  1. Segurança em APIs REST

  2. Heitor Vital ● Áreas de Atuação o Cloud Computing twitter.com/heitorvital o Segurança Informação o Jogos slideshare.net/HeitorVital o Dispositivos Móveis o … labs.siteblindado.com sec@siteblindado.com.br ● Acadêmico o MBA FGV Kadu o Mestrado UFPE o Graduação UFPE

  3. 2014 Global Report on the Cost of Cyber Crime Stop Looking for the Silver Bullet: Start Thinking Like a Bad Guy 257 Empresas 2.081 Entrevistas 1.717 Incidentes $7.6M Média prejuízo 10.4% Crescimento Incidentes More info: 2014 Global Report on the Cost of Cyber Crime

  4. Fonte: http://cloudtweaks.com/2013/10/cloud-infographic-2013-cyber-security-intelligence-index/

  5. Attack Vector by Organizational Size TOPs 1. Web-based attacks 2. Denial of services 3. Malicious insiders

  6. Site vs Plataforma

  7. Let’s [try to] attack ...

  8. Search Surface Detection ● Metadata/Doc o Swagger o RAML o API-Blueprint o I/O Docs ● Discovery ● Brute Force o Invalid data (type, size, length, null, HTTP header, XML bomb, upload file...) Exemplo: http://petstore.swagger.io/#!/pet/updatePet

  9. Protocolo - HTTP

  10. Protocolo - HTTPS http s ://example.com/controller/<id>/action? apiKey=a53f435643de32 Resolve ??

  11. Authentication/Authorization API Keys Abstract OAuth 2.0 flow

  12. Assessments

  13. Injection Normal http://petstore.com/api/v1/pet/123 “SELECT ¡* ¡FROM ¡pets ¡WHERE ¡petID='” ¡+ ¡petId ¡+”‘”; ¡ “SELECT ¡* ¡FROM ¡pets ¡WHERE ¡petID ¡= ¡‘123’” ¡ Injection http://petstore.com/api/v1/pet/’%20or%20’1’=’1 ¡ “SELECT ¡* ¡FROM ¡pets ¡WHERE ¡petID='” ¡+ ¡petId ¡+”‘”; ¡ SELECT ¡* ¡FROM ¡pets ¡WHERE ¡petID ¡= ¡‘’ ¡ or ¡‘1’ ¡= ¡‘1’

  14. XSS (cross site scripting) Solução Header response com ● Content-type: application/json ● x-content-type-options: nosniff Referencias: http://www.w2spconf.com/2013/papers/s3p1.pdf http://stackoverflow.com/questions/3146324/is-it-possible-to-xss-exploit-json-responses-with-proper-javascript-string-escap http://security.stackexchange.com/questions/42093/xss-prevention-for-restful-services

  15. CSRF (cross site request forgery) Solução OAuth state Referências: http://www.twobotechnologies.com/blog/2014/02/importance-of-state-in-oauth2.html e http://hasselba.ch/blog/?p=1854

  16. DoS/DDoS API Gateway ● Call quotas WAF o Calendar Period o Rolling Window ● Package Analysis ● Invalid Inputs ● IP Blacklist o XML Schema ● Region Blacklist o Blacklist Keywords o Blacklist patterns o Malformed messages

  17. Plataforma Separation of Concerns ● Authentication / Authorization ● Logging ● Analytics ● Audit ● Rate Limit ● Payload ● Address Restrictions ● Invalid Inputs o XML Schema o Blacklist Keywords o Blacklist patterns o Malformed messages

  18. Heitor Vital twitter.com/heitorvital slideshare.net/HeitorVital OBRIGADO !!! labs.siteblindado.com sec@siteblindado.com.br Kadu

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend