php[tek] 2023
Attackers want your data and they're getting it from your API
Login
Attackers want your data and they're getting it from your API
Speaker: Tim Bond

Level: Intermediate (some prior knowledge necessary)
Length: Standard Session (45-60 minutes)

Description:
APIs are everywhere. Some companies sell theirs and publish documentation alongside it. Others expose just enough APIs to provide value to the end users through a website or app without ever intending them to be used for any other purpose. Your API is the purveyor to some valuable data, and attackers are eager to get at it. This session will cover some of the methods attackers use to reverse engineer your API and some steps you can take to thwart them. The session will begin by demonstrating a few methodologies on how traffic to an API can be "sniffed" and analyzed. We will then discuss authentication with API keys and OAuth2 and the differences and pitfalls of each. We'll touch on some low hanging fruit on hardening your API: TLS encryption, certificate pinning, and some less obvious techniques including HMAC request signing, obfuscation, compilation protection, and more. At the end of the session you'll have a better understanding of the cat and mouse game that is API security, the knowhow of the tools and techniques attackers might be using to get at your data, and some steps you can implement to better your API's security.

Thanks to our php[tek] 2024 sponsors!
Compassionate Coding
(Bronze)
Private Packagist
(Bronze)
Zend
(Bronze)
SensioLabs
(Bronze)
Vonage
(Bronze)
OSMI
(Bronze)
PubNub
(Bronze)
Vehikl
(Bronze)
FusionAuth
(Beverage Sponsor)
DevITjobs
(Media sponsor)