05 - BruCON 0x10 - Bypassing firewalls with API-to-API Hacking - Johan Caluwé

  Рет қаралды 666

BruCON Security Conference

BruCON Security Conference

Күн бұрын

In this talk we'll explore the opportunities that protocol & standards transformations provide for attackers in environments with an API microservice architecture.
Transformation of user input happens automatically when protocols & standards support certain encodings.
When API backends are constructing their own API calls to 2nd order API's using user input, "chained transformations" happen. This allows an attacker to construct payloads that only manifest in harmful form after a certain number of transformations. The payloads are often too obfuscated to be recognized by the perimeter Web Application Firewall.
This type of vulnerability is present even in hardened targets. Pentesters and bugbounty hunters can maximize the attack surface and increase impact using this bug.

Пікірлер: 1
@NirmalKumarLanka
@NirmalKumarLanka 21 күн бұрын
Great presentation!
11 - BruCON 0x10 - Forensic Flows, but make them better - Jessica Wilson
58:08
BruCON Security Conference
Рет қаралды 771
REAL or FAKE? #beatbox #tiktok
01:03
BeatboxJCOP
Рет қаралды 18 МЛН
It works #beatbox #tiktok
00:34
BeatboxJCOP
Рет қаралды 41 МЛН
SEVEN things about API security - Philippe De Ryck - NDC Oslo 2024
55:36
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laiture
Рет қаралды 160 М.
OAuth 2.0 and OpenID Connect (in plain English)
1:02:17
OktaDev
Рет қаралды 1,8 МЛН
I Gave a Hacker 28 Days To Ruin My Life
21:37
Zac Alsop
Рет қаралды 3,6 МЛН
Getting API security right - Philippe De Ryck - NDC London 2023
51:49
NDC Conferences
Рет қаралды 28 М.
How TCP really works // Three-way handshake // TCP/IP Deep Dive
1:01:10
Back to the Basics - Web Fundamental to 100k a Year in Bug Bounty (Ep. 99)
1:42:55
Critical Thinking - Bug Bounty Podcast
Рет қаралды 10 М.
03 - BruCON 0x10 - CurveBack: A Backdoor Analysis - Rafael Lukas Maers and
47:14
BruCON Security Conference
Рет қаралды 235