This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vicnum Project"
From OWASP
(→Others) |
(→Road Map and Getting Involved) |
||
Line 124: | Line 124: | ||
= Road Map and Getting Involved = | = Road Map and Getting Involved = | ||
− | + | = Road Map and Getting Involved = | |
− | + | The vulnerable API ! | |
− | + | ||
− | + | API’s are everywhere! Mobile & web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s. A vulnerable API can be just as destructive as a vulnerable web application. So, how do you test an API? The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities. This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as: | |
+ | Authentication | ||
+ | ---- | ||
+ | Injection | ||
+ | ---- | ||
+ | Verbosity | ||
+ | ---- | ||
+ | Transport Encryption | ||
+ | Denial of Service | ||
+ | ---- | ||
+ | Insecure Direct Object References | ||
+ | ---- | ||
+ | Unrestricted File Uploads | ||
+ | |||
+ | |||
+ | |||
+ | |||
Involvement in the development and promotion of Vicnum is actively encouraged! | Involvement in the development and promotion of Vicnum is actively encouraged! | ||
You do not have to be a security expert in order to contribute. | You do not have to be a security expert in order to contribute. | ||
Some of the ways you can help: | Some of the ways you can help: | ||
− | * | + | * Coming up with a name (and maybe themes for a vulnerable API program) |
− | |||
− | |||
− | |||
=Project About= | =Project About= |