naryCyber
  • Home
  • About
  • Skills
  • Recent Posts
  • Posts
  • Dark Theme
    Light Theme Dark Theme System Theme
  • Posts
  • Hey, Welcome
  • Api Penetration Testing
    • OWASP API10 via VAPI
  • Privilege Escalation
    • Linux
      • Sudo Exploitation
    • Windows
      • Setting Up a lab
      • Service Misconfiguration
  • Vulnhub walkthrough
  • Toolkit
    • Accesschk.exe
Hero Image
OWASP API Security Top 10 via VAPI Walkthrough

According to a Gartner report in 2020 APIs account for 90% of the attack surface and are the most frequent attack vector. APIs often handle sensitive data, such as personal information, financial data, and intellectual property. If an API is not properly secured, this data can be easily accessed and stolen by hackers. In fact, some of the recent big data breaches have been due to under-protected APIs. In this blog post, I am going to discuss OWASP top 10 API 2019 vulnerabilities by using VAPI.

Friday, April 28, 2023 Read
Navigation
  • About
  • Skills
  • Recent Posts
Contact me:
  • jusnary1@gmail.com
  • Justus Juvenary

Justus Juvenary
© 2024 Copyright.
NaryCyber