paint-brush
A Tour of API Underprotectionby@skiph
489 reads
489 reads

A Tour of API Underprotection

by Skip HovsmithApril 4th, 2018
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The fifth annual <a href="https://2018.appseccalifornia.org/" target="_blank">OWASP AppSec California</a> was held in late January 2018 on the beach in Santa Monica. AppSec California is organized and run by an all-volunteer staff, and they put on a great conference — highly recommended. Besides excellent content and a chance to interact with many interesting colleagues, who wouldn’t want to hang out on the beach for a few days?

Company Mentioned

Mention Thumbnail
featured image - A Tour of API Underprotection
Skip Hovsmith HackerNoon profile picture

An OWASP AppSec California 2018 Talk

The fifth annual OWASP AppSec California was held in late January 2018 on the beach in Santa Monica. AppSec California is organized and run by an all-volunteer staff, and they put on a great conference — highly recommended. Besides excellent content and a chance to interact with many interesting colleagues, who wouldn’t want to hang out on the beach for a few days?

An overview of the event can be found on the AppSec California 2018 website, including links to many of the slides used during the presentations. Most presentations were video taped and are available on you tube.

My talk on API Underprotection was given to a standing room only crowd which asked some very good questions at the end.

In the video, you’ll follow the evolution of the ShipFast courier service API, its branded backend service and mobile Android client, and its attacker, ShipRaider, used by both malicious and legitimate couriers to exploit the API for their own ill-gotten gains.

API User and Abuser

We start with static API keys and OAuth2 user authorization, discussing API security threats and how to counter them. Along the way, TLS, certificate pinning, HMAC call signing, app hardening, white box crypto, and app attestation are considered to strengthen your API security posture, but ShipRaider will be working hard trying man in the middle attacks, app decompilation and debugging, exploit frameworks, and other reverse engineering techniques to keep stalking you.

It’s a fast-moving overview of the cat and mouse API protection problem on mobile and provides a sense of emerging tools and techniques which enable a significant step change in API security.

ShipFast and ShipRaider are open-sourced by CriticalBlue and are available on github with stories of some additional attack-defense scenarios. You’ll walk away with access to a fully worked open source example and some additional homework assignments if you want to go deeper. A more thorough overview of mobile API protection may also be of interest.

Thanks for reading! For more information on mobile API security, check out www.approov.io.

I’d really appreciate it if you recommend this post (by clicking the 👏 button) so other people can find it.